22-10875E Ebook CB
22-10875E Ebook CB
ORGANIZED CRIME
SECOND EDITION
UNITED NATIONS OFFICE ON DRUGS AND CRIME
Vienna
DIGEST OF CYBER
ORGANIZED CRIME
SECOND EDITION
UNITED NATIONS
Vienna, 2022
© United Nations, December 2022. All rights reserved.
The designations employed and the presentation of material in this publication do not imply the expression of
any opinion whatsoever on the part of the Secretariat of the United Nations concerning the legal status of any
country, territory, city or area, or of its authorities, or concerning the delimitation of its frontiers or
boundaries.
Publishing production: English, Publishing and Library Section, United Nations Office at Vienna.
Preface
The present publication was developed by the United Nations Office on Drugs and Crime (UNODC), under
phase II of the global programme on implementing the United Nations Convention against Transnational
Organized Crime: from theory to practice, thanks to the generous support from the Governments of the
United Arab Emirates and the United States of America. This is an updated version of the publication,
which includes new cyber organized crime cases. It was updated thanks to the generous support of the
United Kingdom of Great Britain and Northern Ireland. The publication was drafted by Marie-Helen Maras,
with substantive support from the following UNODC staff members: Lisa Armberger, Carmen Corbin,
Colin Craig, Renata Delgado-Schenk, Wydiane Djaidi, Kamola Ibragimova, Nayelly Loya Marin, Maria
Cristina Montefusco, Riikka Puttonen and Adelaida Rivera. UNODC would also like to thank the following
persons for contributing case summaries for this digest: Élise Corsion, Margot Denier, Mariana Kiefer,
Irene Maithya, Max Menn, Lorenzo Picarella, Louise Pichler, Jesper Bay Kruse Samson and Manveer
Singh Sandhu.
To expand, disseminate and share the key findings of the case digest, through the global programme on
implementing the United Nations Convention against Transnational Organized Crime and the Global
Programme on Cybercrime, expert group meetings were held online for countries in Africa, Latin America
and the Middle East during the period 2019–2022, thanks to the support of the Governments of the United
Arab Emirates, the United Kingdom and the United States. UNODC would like to thank Janet Turnbull and
Berta Moran from the United States Department of State at the United States Embassy in El Salvador for
their support in the organization of the online expert group meetings for Latin America.
UNODC also wishes to acknowledge the contributions of numerous experts who attended the online expert
group meetings to support the development of this case digest and the following people who provided cases
highlighted in the present publication (listed in alphabetical order by country name): Cristina Giordano,
María Alejandra Mangano and Franco Pilnik (Argentina); James Popham (Canada); Daniel Soto (Chile);
Romel David Arévalo Gómez and Nelly Johanna Molina Alarcón (Colombia); Rodrigo Picado Mena (Costa
Rica); Marta Pelechová (Czechia); Patricia Alejandra Padilla (Dominican Republic); Mohamed Khalaf
(Egypt); Raymundo Alirio Carballo Mejia (El Salvador); Ingrid Serwah Asare (Ghana); Ihab Al Moussaoui
(Iraq); Enrique Juárez Cienfuegos and Hector Javier Talamantes Abe (Mexico); Giselle M. Acosta González
(Panama); Seongjin Park (Republic of Korea); Ultrich Kruger (South Africa); Joseph Budd, Alex Chung
and Charles Lee (United Kingdom); and Louisa Marion, Chad McHenry and Kelly Pearson (United States)
and. Marcus Asner also contributed to the development of this case digest in this manner.
iii
CONTENTS
Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . iii
Explanatory notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vii
I. INTRODUCTION. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
A. Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
B. Methodology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
C. Target audience . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
D. Structure of the publication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
v
4. Counterfeiting. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
5. Extortion, blackmail and ransom . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
6. Child sexual abuse and child sexual exploitation . . . . . . . . . . . . . . . . . . . . . 76
7. Trafficking in persons . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
8. Smuggling of migrants . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
9. Drug trafficking. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
10. Trafficking in firearms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90
11. Trafficking in wildlife. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
12. Trafficking in cultural property . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
13. Money-laundering. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
14. Internet gambling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102
ANNEX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138
List of cases involving cyber organized crime . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138
vi
Explanatory notes
Mention of any firm, product, service or licensed process does not imply endorsement or criticism by the
United Nations.
Mention of any case in the present publication does not imply endorsement of any kind.
Symbols of United States documents are composed of capital letters combined with figures. Mention of
such a symbol indicates a reference to a United Nations document.
The following abbreviations have been used:
ATM automatic teller machine
vii
CHAPTER I.
INTRODUCTION
DIGEST OF CASES
I. INTRODUCTION
The present case digest contains an analysis of cases of cyber organized crime. The digest is global in scope
and attempts, to the extent possible, to ensure an equitable representation of cases from different geographical
regions and legal systems. On the basis of more than 130 cases from 30 jurisdictions, observations are made
about the ways in which cyber organized crime is identified in case law and how this illicit activity is investi-
gated, prosecuted and adjudicated across jurisdictions. The case digest examines the structure and organiza-
tion of cyber organized criminal groups, tools used by perpetrators of cyber organized crime, types of cyber
organized crime and procedural issues relating to the investigation, prosecution and adjudication of
cyber organized crime cases. The case digest contains summaries of relevant judicial proceedings concerning
cyber organized crime, organized according to theme. The ultimate goals of the digest are to identify cases
involving cyber organized crime and the manner in which such crime has been investigated, prosecuted and
adjudicated in different areas of the world. The digest concludes by identifying challenges to investigating,
prosecuting and adjudicating cases involving cyber organized crime, as well as the lessons learned for criminal
justice professionals, including some of the challenging aspects of criminal justice responses to such crime.
A. Background
Information and communications technology (ICT) has transformed conceptions of organized crime.
Specifically, ICT has had an impact on the nature of organized crime activities and the types of individuals
who can participate in organized crime. This transformation includes changes not only in the types of
offences committed and the modi operandi used by organized criminal groups, but also the variety of indi-
viduals who can participate in organized crime. Some traditional organized criminal groups are gradually
expanding from offline criminal activities to cybercrime, although, to date, this has not been observed as a
full transition. What has been observed is the movement of certain illicit activities and operations of these
groups online. Such groups are also increasingly seeking to cooperate with cybercriminals who have the
critical and essential skills that these groups can use or actually need to execute certain operations. These
individuals can be, for example, coders (i.e., individuals responsible for developing malicious software
(malware), exploits and other tools used to commit cybercrime) and hackers (i.e., individuals responsible
for exploiting the vulnerabilities of systems, networks and applications).1
ICT has also transformed the way in which certain groups are structured and organized. It removes the need
for face-to-face contact between individuals and enables individuals who have never met before to work
closely together and coordinate their activities from anywhere in the world. Criminals within these groups
can collaborate on illicit activities and objectives using aliases; thus, the risk of revealing their identities and
locations to other members of the group is relatively low.
In addition to the evolution in the structure of traditional organized criminal groups, what has also been
observed is the formation of “new” groups and networks that commit cybercrimes and operate partially,
predominantly or fully online. These groups exhibit behaviours similar to those of traditional organized
criminal groups – particularly the use of their structure and special procedures, which are designed to pre-
serve the anonymity of their members and evade detection by law enforcement agencies.
Moreover, ICT has further removed the barriers for entry into illicit markets. No longer limited by geo-
graphical locations, individuals can be part of organized criminal groups from anywhere in the world. This
technology also provides criminals with the infrastructure, goods, personnel and customers needed to
engage in activities related to cyber organized crime.2 For these reasons, ICT has played a critical role in the
expansion of illicit markets and networks and has made illicit business models more efficient and effective.
Ultimately, cyberspace provides organized criminal groups with a space within which they can conduct
1
Steven R. Chabinsky, Deputy Assistant Director, Cyber Division Federal Bureau of Investigation, “The cyber threat: who’s
doing what to whom?”, speech at the GovSec/FOSE Conference, Washington, D.C., 23 March 2010; and Roderic Broadhurst and
others, “Organizations and cybercrime: an analysis of the nature of groups engaged in cyber crime”, International Journal of Cyber
Criminology, vol. 8, No. 1 (2014), pp. 1–20.
2
Marie-Helen Maras, Cybercriminology (New York, Oxford University Press, 2017).
2
CHAPTER I. INTRODUCTION
their illicit activities with a degree of anonymity, exploit the gaps in the legal systems throughout the world,
conduct operations and access clients anywhere in the world. The problem of transnational organized crime
is thus further compounded by ever-increasing global connectivity and the borderless realm of
cyberspace.
One of the main challenges is to identify cyber organized crime and cyber organized criminal groups, as
well as the extent to which these groups operate exclusively, predominantly and/or partially online. At the
present time, little is known about cyber organized crime. While there is a growing body of research into
various forms of cybercrime, there is comparatively less research on cyber organized crime. While cyber
organized crime is a dimension of cybercrime, it requires separate consideration and study. This separate
consideration and study can help to shed light on the serious cybercrimes perpetrated by multiple partici-
pants working together to achieve a goal and protect their online criminal activities. Without understanding
the exact nature and extent of the threat, States continue to struggle in containing the security threat
emanating from cyber organized crime. Moreover, without this information, policymakers and other stake-
holders cannot make informed decisions in response to cyber organized crime and identify proper courses
of action to respond to or otherwise address cyber organized crime. To remedy this, the present case digest
seeks to shed light on cyber organized crime and identify cyber organized crime cases from different
regions. It identifies and analyses cyber organized crime cases in an attempt to determine not only key char-
acteristics of this form of crime and the groups that commit such crime, but also gaps in knowledge and
criminal justice practices as they relate to the investigation, prosecution and adjudication of cases involving
this crime.
There is no international consensus on a definition of cyber organized crime. However, for the purpose of
this digest only, cyber organized crime will be interpreted broadly to include either a cyber-enabled crime3
or a cyber-dependent crime4 and involve either an organized criminal group (defined in article 2 of the
United Nations Convention against Transnational Organized Crime) or an offence established in accord-
ance with article 5 of the Convention (i.e., conspiracy or criminal association).5 The digest identifies and
analyses cyber organized crime cases from various regions with the objective of finding out the ways in
which cases involving such crime are investigated, prosecuted and adjudicated, as well as the limitations of
and lessons learned from criminal justice responses to such crime.
B. Methodology
The research for this digest predominantly involved a systematic review of primary sources, supplemented
by secondary sources. The research began with the identification of cyber organized crime cases in the case
law database of the Sharing Electronic Resources and Laws on Crime (SHERLOC) knowledge manage-
ment portal of the United Nations Office on Drugs and Crime (UNODC). The database does not record
cases involving cyber organized crime but includes cases that cover both “cybercrime” and “participation
in an organized criminal group”.
Following the review of the SHERLOC case law database and the identification of cyber organized crime
cases in the database, cases were solicited from experts participating in four regional expert group meetings
on cyber organized crime that were held online (the first meeting, hosted by the United Arab Emirates, was
3
Cyber-enabled crimes are traditional crimes that are facilitated (in some way) by information and communications technology
(ICT). For cyber-enabled crimes, ICT plays a key role in the method of operation (i.e., modus operandi of the offender or offenders;
see also United Nations Office on Drugs and Crime (UNODC) Teaching Modules, Cybercrime, Module 1: introduction to cybercrime,
“Cybercrime in brief”. Available at sherloc.unodc.org/cld/en/education/tertiary/cybercrime/module-1/index.html.
4
For cyber-dependent crimes, which include crimes that “can only be committed using computers, computer networks or other
forms of information communication technology”, ICT is the target of the crime (Mike McGuire and Samantha Dowling, “Cyber-
dependent crimes”, in Cybercrime: A Review of the Evidence, Home Office Research Report 75 (London, 2013), p. 4; see also
European Union Agency for Law Enforcement Cooperation (Europol), European Cybercrime Centre, Internet Organised Crime
Threat Assessment 2018 (The Hague, 2018), p. 15).
5
Organized criminal groups are involved in the commission of cyber-assisted, cyber-enabled and cyber-dependent crimes. Cyber-
assisted crimes are those crimes where ICT is incidental to the illicit act (e.g., technology is used to facilitate communication between
members). While organized criminal groups utilize ICT to communicate and coordinate activities, the use of this technology in this
manner is not considered a cybercrime because it is incidental and not integral to the crime. For this reason, cyber-assisted crimes are
excluded from consideration in this digest.
3
DIGEST OF CASES
held from 21 to 24 September 2020; the second meeting, hosted by the United States Embassy in
El Salvador, was held from 19 to 21 February 2021; the third meeting, hosted by UNODC, was held from
24 to 26 November 2021; and the fourth meeting, hosted by the United States Embassy in El Salvador, was
held from 29 to 31 March 2022), as well as from States, volunteers and UNODC staff. Desk research was
also performed using private case law databases (e.g., LexisNexis and Westlaw), open case law databases
(government databases, legal information institutes), secondary literature (e.g., law journals and academic
publications) and media sources (wherever needed). Moreover, the digest draws on an earlier work by
UNODC, which included some cases of cyber organized crime involving trafficking in persons, particularly
the 2021 research brief of UNODC on trafficking in persons and Internet technologies, as well as the cases
presented at its supplementary expert group meeting on trafficking in persons and Internet technologies,
held in Vienna from 25 to 27 November 2019.
This case digest is primarily based on primary sources and hence access to court documents such as judg-
ments, indictments and/or transcripts was a prerequisite for inclusion in the digest. The guiding principles
for selection were: (a) representation of a variety of dimensions and issues relating to cyber organized
crime; (b) representation of a variety of geographical regions and legal systems; and (c) conclusion of the
cases within the period 2000–2020, which is the period covered by this case digest. Classified information
does not appear in the digest, and the names of defendants appear in the digest only if the names appear in
the official case citation. The cases referred to in the case digest are not the only ones that concern the sub-
ject of this digest. The most relevant cases or those considered to be good examples of cases involving cyber
organized crime are cited in this document. At the same time, inclusion of a particular case in this digest
does not imply endorsement of any kind by UNODC.
The identification of cases involving cyber organized crime in case law is challenging because the cases
are not recorded as cyber organized crime. In many cases involving cyber organized crime, individuals
are not charged with organized crime and/or participation in an organized criminal group; and/or cyber
organized crime, organized criminal groups and/or participation in an organized criminal group are not
explicitly mentioned. For these reasons, the identification of a case involving cyber organized crime
requires a thorough examination of the details of the case in court documents. Accordingly, for this
digest, court documents were examined and analysed to identify essential elements of cyber organized
crime, such as the existence of organized criminal groups or participation in an organized criminal group,
and the engagement of defendants in cyber-dependent and/or cyber-enabled crime. Another challenge
was obtaining court transcripts and other court documents relating to the cases. These documents were
not always publicly available or publicly accessible. A further challenge was identifying cases from a
variety of geographical regions and legal systems. Cases from certain developed countries were more
readily available. Nonetheless, even in such countries, access to many judicial decisions is restricted by
a paywall. In least developed countries, there may be no (or only a limited number of) judicial decisions
that are accessible online. Language limitations of the researchers and drafters working on the case digest
posed an additional challenge.
Other limitations are inherent in this methodology. The case digest is not a comprehensive review of all
judicial decisions dealing with cyber organized crime in all countries. A fully comprehensive review of
all countries is well beyond the scope of this digest. Moreover, the use of judicial decisions as a method-
ology for the development of the publication also has inherent limits. Concluded judicial decisions come
at the end of a long process of investigation, prosecution and adjudication of offences. At each stage of
this process, various factors affect whether and how a case proceeds to the next stage. First, some types
of cybercrime are more likely than others to be reported to authorities for investigation. This may be
attributable to a variety of factors, including who the victims are and the size and nature of the harm
caused. Secondly, not all offences reported to authorities proceed to the investigation stage. In addition
to the aforementioned factors, whether an investigation is opened may also depend on law enforcement
priorities and resources. Thirdly, not all offences that are investigated lead to charges being laid. This
may be affected by a range of issues such as lack of evidence, difficulties with international cooperation,
difficulties with jurisdiction and difficulties with identifying and extraditing suspects. Fourthly, not all
cases in which charges are laid will proceed to trial. In some countries, prosecutors have a discretion as
to which cases should be brought to trial. Charges may be dropped where prosecution is deemed not to
be in the best interests of the community. Charges may also be dropped where there is a lack of evidence
4
CHAPTER I. INTRODUCTION
or as part of incentives to cooperate with law enforcement. Only a minority of cases will reach the end of
this process and be subject to a final judicial decision, whether a conviction or acquittal. Finally, not all
cases that are subject to a final judicial decision will be published. The factors that hinder investigation,
prosecution, adjudication and publication of cases will vary according to, inter alia, the crime in question
and the country in which it takes place. Factors that hinder investigation, prosecution, adjudication and
publication are likely to be more pronounced in least developed countries. Each of the aforementioned
factors can have an effect on the type of cases obtained for inclusion in the case digest and on the coun-
tries represented in the digest. Accordingly, the case digest cannot be considered a representative sample
of all cases involving cyber organized crime in all countries. Nevertheless, within these limitations, the
case digest seeks to provide a broad overview of cyber organized crime threats faced in countries through-
out the world and the responses of investigators, prosecutors and the judiciary.
C. Target audience
The present digest is designed for a wide audience of readers. It is intended to serve as a reference guide
to help criminal justice actors identify and counter cyber organized crime and address the challenges in
investigating, prosecuting and adjudicating cyber organized crime. Academics, researchers, practitioners,
policymakers, legislators and proponents of legislative reform may also find this digest useful. Ultimately,
the digest can be used as a resource on what cyber organized crime entails and the manner in which it is
investigated, prosecuted and adjudicated worldwide.
5
DIGEST OF CASES
evidence (expedited preservation of data, production orders, real-time collection of communication traffic
data, and interception of content data); and various forms of international cooperation (extradition, mutual
legal assistance, law enforcement cooperation and joint investigations).
Finally, the digest includes a chapter on conclusions and lessons learned in the investigation, prosecution
and adjudication of cases involving cyber organized crime.
6
CHAPTER II.
CYBER ORGANIZED CRIME:
WHAT IS IT?
DIGEST OF CASES
There is no international consensus on the definition of cyber organized crime.6 For the purpose of this
digest only, cyber organized crime is being viewed broadly as any cyber-dependent and/or cyber-enabled
crime that is either: (a) committed by an organized criminal group, as defined in article 2, subparagraph (a),
of the United Nations Convention against Transnational Organized Crime, adopted in 2000; or (b) involving
an offence established in accordance with article 5 of the Convention, which covers the criminalization of
participation in an organized criminal group. Each of these elements are explored in the sections that follow.
6
UNODC, Comprehensive Study on Cybercrime, draft (Vienna, 2013); Broadhurst and others, “Organizations and cybercrime”;
see also UNODC Teaching Modules, Cybercrime, Module 13: cyber organized crime, “Conceptualizing organized crime and defining
the actors involved”. Available at sherloc.unodc.org/cld/en/education/tertiary/cybercrime/module-13/index.html.
7
See also UNODC Teaching Modules, Organized crime, Module 1: Definitions of organized crime, “Activities, organization and
composition of organized criminal groups”. Available at sherloc.unodc.org/cld/en/education/tertiary/organized-crime/module-1/
index.html; UNODC Teaching Modules, Cybercrime, Module 13: cyber organized crime, “Conceptualizing organized crime and
defining the actors involved”. Available at sherloc.unodc.org/cld/en/education/tertiary/cybercrime/module-13/index.html.
8
UNODC, Model Legislative Provisions against Organized Crime (Vienna, 2012), p. 8.
9
UNODC, Legislative Guide for the Implementation of the United Nations Convention against Transnational Organized Crime
(Vienna, 2016), para, 35.
10
The “offences established in accordance with this Convention” that are mentioned in the definition of “organized criminal
group” are established in accordance with article 5 (criminalization of participation in an organized criminal group), article 6 (crim-
inalization of the laundering of proceeds of crime), article 8 (criminalization of corruption) and article 23 of this Convention (crimi-
nalization of obstruction of justice).
11
Travaux Préparatoires of the Negotiations for the Elaboration of the United Nations Convention against Transnational
Organized Crime and the Protocols Thereto (United Nations Publications, 2006), p. 17; cited in UNODC, Legislative Guide for the
Implementation of the United Nations Convention against Transnational Organized Crime, para. 34.
8
CHAPTER II. Cyber organized crime: What is it?
The requirement that the organized group commit a serious crime to obtain some form of “financial or other
material benefit” is not a universal requirement in national legislation on organized crime, however. In the
United Kingdom of Great Britain and Northern Ireland, for example, the definition of an organized criminal
group (or organized crime group, as it is called in the Serious Crime Act 2015) does not refer to “financial
or other material benefit”. Instead, the Act refers to a group of “three or more persons who act, or agree to
act, together to further” a criminal purpose.12 Likewise, in Germany, the law’s definition of an organized
criminal group does not include an element concerning the purpose of obtaining a financial or other mate-
rial benefit.13 In a case before the Federal Court of Justice of Germany, a group of seven persons charged
with and convicted for inciting hatred and distributing unconstitutional content via an Internet radio show
(European Brotherhood Radio) were considered a “criminal organization” (see the box below).14
Regarding the technical functioning of the radio shows, W. provided the defendants P. and M, and
later also the defendants B., Br. and F., with access that enabled them to control and moderate the
radio stream. The defendants W. and P. also moderated their own radio shows, where they – in part
together, in part on their own – played right-wing extremist songs and other illegal content.
Moreover, they recruited other persons to moderate the shows, including the defendants B., Br. and
F., and advertised the positions by using stickers, banners, jingles, etc. on the website as well as on
the subpages. On 21 February 2009, they also organized an advertising event for the radio. Defendant
M. rented the radio stream through which the shows aired and were heard by 20–50 people. He also
moderated a continuous broadcast from 24 to 26 February 2009 where he played right-wing extrem-
ist songs with inciteful and otherwise illegal content. Defendant R. invested several small amounts
of money, including for the creation of the banner and the rent of the radio stream, and maintained
the chat rooms on the website.
All of the defendants were convicted of forming a criminal organization. Moreover, the defendants
had thousands of right-wing extremist files in their possession in order to make them available to
the listeners of the radio shows. For this reason, they were convicted for the offences of incitement
of masses, dissemination of propaganda material of unconstitutional organizations, and use of
symbols of unconstitutional organizations. Independent of the radio stream, defendant W. was in
possession of two objects banned under the Weapons Act, as well as a gun and ammunition requir-
ing a licence, which he did not have.
For more information on this case, see UNODC Sharing Electronic Resources and Laws on Crime
(SHERLOC) case law database, Case No. DEUx028.a
a
Available at https://sherloc.unodc.org/.
12
United Kingdom of Great Britain and Northern Ireland, Serious Crime Act of 2015, sect. 45 (6).
13
Germany, Criminal Code, sect. 129.
14
Germany, Federal Court of Justice Decision No. 3 StR 230/10 of 19 April 2011 (BGH, Beschluss vom 19.04.2011, 3 StR
230/10).
9
DIGEST OF CASES
1. Conspiracy
In common-law countries, conspiracy is used to address criminal participation in an organized criminal
group. Conspiracy is a voluntary agreement between two or more persons to commit an illicit act. In article 5,
paragraph 1 (a) (i), of the Organized Crime Convention, conspiracy is paraphrased as “agreeing with one or
more persons to commit a serious crime for a purpose relating directly or indirectly to the obtaining of a
financial or other material benefit and, where required by domestic law, involving an act undertaken by one
of the participants in furtherance of the agreement or involving an organized criminal group”.
Article 5, Agreeing with one or more The agreement was entered into
paragraph 1 (a) (i) other persons to commit intentionally. The agreement was made
a serious crime for a purpose relating directly or
indirectly to obtaining a financial or other
material benefit.
Source: UNODC, Model Legislative Provisions against Organized Crime (Vienna, 2021).
The crime that is part of this voluntary agreement does not have to be committed for criminal responsibility
to apply. The crime of conspiracy is known as an inchoate crime, which is an illicit act taken towards the
preparation to commit and/or the commission of a crime. In some jurisdictions, beyond the agreement,
some action must be taken towards the commission of the crime. The crime of conspiracy is distinct from
the crime that is the object of the conspiracy (i.e., the crime that the conspirators agree to commit). For this
reason, people may be charged with and convicted for both conspiracy and the crime (or crimes) that they
agreed to commit.
15
UNODC, Legislative Guide for the Implementation of the United Nations Convention against Transnational Organized Crime,
para. 72; and CTOC/COP/WG.2/2014/2, para. 4.
16
UNODC, Legislative Guide for the Implementation of the United Nations Convention against Transnational Organized Crime,
para. 73; and CTOC/COP/WG.2/2014/2, paras. 4–5.
10
CHAPTER II. Cyber organized crime: What is it?
UKBargins (AlphaBay)
Using the computer moniker “UKBargins”, the defendants (J.L., M.C.L. and L.M.C.) sold adulterated
fentanyl and carfentanil online on AlphaBay, a darknet market. They distributed the drugs domes-
tically, in the United Kingdom of Great Britain and Northern Ireland, and internationally, in Argentina,
Canada, the United States of America and other countries, including European countries. The
majority of the customers (271 of the 443 identified customers) were overseas.a The defendants
purchased the equipment and rented premises used to create and package the products they sold
(carfentanil and fentanyl mixed with adulterants). The products were mailed to buyers using postal
services. The three defendants were charged with and sentenced for conspiracy to evade prohibi-
tion of the exportation of controlled substances and conspiracy to provide controlled substances.b
All three defendants pleaded guilty to their crimes. Two of the defendants (J.L. and M.C.L.) were
sentenced to 16 years and 6 months of imprisonment, while the third defendant (L.M.C.) received a
sentence of 10 years and 6 months of imprisonment.
For more information on this case, see UNODC, SHERLOC case law database, Case No. GBRx097.c
a
United Kingdom, Crown Court Leeds, R v. Lavene [2017], T20177358. Amended Sentence Opening. Judgment of 29 May
2018.
The specific charges were: conspiracy to evade prohibition on the exportation of a controlled drug of class A – carfentanyl;
b
conspiracy to evade prohibition on the exportation of a controlled drug of class A – fentanyl; conspiracy to supply a class A drug
– carfentanyl; and conspiracy to supply a class A drug – fentanyl. R. v. Lee Matthew Childs, Crown Court Leeds, T20177358, Order
for imprisonment of 18 January 2019; Regina v. Jake Lavene, Mandy Christopher Lowther, Lee Childs, Crown Court Leeds, Case
No. T20177358, Order for imprisonment of 18 January 2019; and Regina v. Mandy Christopher Lowther, Crown Court Leeds,
T20177358, Order for imprisonment of 18 January 2019.
c
Available at https://sherloc.unodc.org/.
2. Criminal association
In article 5, paragraph 1 (a) (ii), of the Organized Crime Convention, criminal association is paraphrased as
follows:
(ii) Conduct by a person who, with knowledge of either the aim and general criminal activity of an
organized criminal group or its intention to commit the crimes in question, takes an active part in:
a. Criminal activities of the organized criminal group;
b. Other activities of the organized criminal group in the knowledge that his or her participation
will contribute to the achievement of the above-described criminal aim.
11
DIGEST OF CASES
Source: UNODC, Model Legislative Provisions against Organized Crime (Vienna, 2012).
Civil-law countries typically criminalize association with a group that has criminal objectives. In such
countries, a person can be charged with criminal association for illegal and/or legal activities that they
engage in on behalf of and/or for the organized criminal group. The person engaging in these acts must be
knowledgeable of the criminal nature, activities and/or objectives of the group.
Cassazione penale, sezione III, 12 Febbraio 2004, No. 8296, & Tribunale
di Siracusa, 19 Luglio 2012, No. 229 (Italy)
A case in Italy involved a chat group on MSN (“Foto di Preteen”) where child sexual abuse material
was shared among members of the community. This case represents one of the first instances in
that country where unlawful association (art. 416 of the Criminal Code (“Associazione per delin-
quere”)) was applied to criminal groups operating online. The court determined whether the legal
definition of unlawful association could be applied to online criminality.
In this case, the court identified the presence of all of the following elements of unlawful associa-
tion: (a) the existence of a bond between at least three persons that was not short term or occa-
sional; (b) the existence of a criminal plan that constituted the aim of the organization; and (c) the
existence of an organizational structure, with a minimum degree of sophistication, that enabled the
criminal plan to be carried out. The court held that the website allowed different persons to coop-
erate for a period of time. The website had a defined structure, with a webmaster who represented
the leader of the criminal association and who established and enforced a set of strict internal rules
regulating the organization – rules that all of the subscribers of the group had to follow and abide
by (e.g., rules for joining the website and punishment for non-compliance with the rules). In addi-
tion, the court held that the organization achieved its objectives through the website, which enabled
the collection and distribution of child sexual abuse material. Citing the above-mentioned findings
and reasons, the court concluded that the legal definition of organized crime could also be applied
to online criminal groups.
For more information on this case, see UNODC, SHERLOC case law database, Case No. ITAx030.a
a
Available at https://sherloc.unodc.org/.
12
CHAPTER III.
CYBER ORGANIZED
CRIMINAL GROUPS
DIGEST OF CASES
17
See also UNODC Teaching Modules, Cybercrime, Module 13: cyber organized crime, “Criminal groups engaging in cyber
organized crime”. Available at sherloc.unodc.org/cld/en/education/tertiary/cybercrime/module-13/index.html.
18
Federal Court of Australia, Hew Raymond Griffiths v. United States of America, 143 FCR 182 (2005), 2005 WL 572006
(DrinkorDie leader); see also United States, Department of Justice, “Extradited software piracy ringleader sentenced to 51 months in
prison”, press release, 22 June 2007.
19
United States District Court, United States of America v. Gal Vallerius (2018).
20
See, for example, Southern District of New York, United States of America v. Gary Davis, Case No. 1:13-CR-950-2, 26
July 2019 (UNODC, SHERLOC case law database, Case No. USAx156) (Silk Road); United States of America v. Ross William
Ulbricht, Case No. 15-1815 (2d Circuit 2017), 31 May 2017 (UNODC, SHERLOC case law database, Case No. USAx202); Western
District of Louisiana, United States of America v. John Doe #1, Edward Odewaldt, et al., Case No. 10-CR-00319, Third Superseding
Indictment, 16 March 2011, pp. 4–5 (Dreamboard); Western District of Washington, United States of America v. Brian Richard Farrell,
Case No. 2:15-CR-29-RAJ (Silk Road 2.0), 17 January 2015); United States District Court, United States of America v. Gal Vallerius
(Dream Market).
21
Crime as a service refers to criminals’ provision of services that facilitate crimes and/or cybercrimes (Maras, Cybercriminology);
Roderic Broadhurst and others, Malware Trends on “Darknet” Crypto-markets: Research Review – Report of the Australian National
University Cybercrime Observatory for the Korean Institute of Criminology (Canberra, Australian National University, Cybercrime
Observatory, 2018).
22
United States District Court, District of New Jersey, United States of America v. Andrew Mantovani et al., Criminal Indictment,
Case No. 2:04-CR-0078, 28 October 2004, p. 2 (Shadowcrew).
23
United States, Northern District of Ohio, United States of America v. Bogdan Nicolescu, Tiberiu Danet and Radu Miclaus
(Bayrob Group), Case No. 1:16-CR-00224, Indictment, (8 July 2016).
14
chapter III. Cyber organized criminal groups
and law enforcement agencies.24 These groups also take measures to evade law enforcement detection that
accord with the type of services they provide. In fact, forums with child sexual abuse material and special-
ized forums for cybercriminals only commonly have greater security measures than those sites that offer
controlled drugs and other illegal goods. For instance, Dreamboard, an illicit site where child sexual abuse
material was exchanged, took significant measures aimed at preventing infiltration by law enforcement
agencies by requiring all its members to be vetted and to continuously contribute child sexual abuse mate-
rial to the platform.25 In addition, the administrator of Card Planet (a “carding” forum where credit card data
that were stolen predominantly through computer intrusions were made available for a fee) had also created
a site called Cybercrime Forum for elite cybercriminals.26 Any person interested in using this site had to first
become a member, and to do that the person had to be vetted by three existing members and had to pay a
fee (usually 5,000 United States dollars as a form of insurance). The existing members of the site would
then vote on whether the prospective member should be granted access to the site.27 The Cybercrime Forum
also took other security measures to avoid detection by law enforcement agencies. For example, arrested
members were banned from the site to prevent law enforcement agencies from using them and/or their
details to access the site.28
Typologies have been created on criminal groups that engage in cybercrime based on the structures of these
groups and their degree of involvement in offline and/or online activities.29 Cyber organized criminal groups
can be broken down into three types:30 groups that predominantly operate online and commit cybercrime;
groups that operate both offline and online and engage in both offline crime and cybercrime; and groups that
predominantly operate offline and engage in cybercrime to expand and facilitate their offline activities.
Each of these is explored in the subsections that follow.
(a) Swarms
A swarm can be described as the coalescence, for a limited period of time, of individuals to engage in specific
tasks in order to commit a cybercrime.31 Once they complete their assigned task or objectives and/or succeed
in committing the cybercrime as a collective, some, most or all of the individuals may go their separate ways
and the temporary group that has been formed may disband.32 This disbanding does not preclude any of the
individuals from becoming part of another swarm to engage in a similar or different cybercrime in the future,
with some or all of the same individuals or with other individuals.
Swarms are characterized as decentralized networks, typically (though not exclusively) made up of “ephem-
eral clusters of individuals” with a common purpose and minimal chains of command.33 A common purpose
of a swarm is to commit a cybercrime for ideological reasons and the individuals who join swarms tend to
24
Ibid.
25
United States of America v. John Doe #1, Edward Odewaldt, et al. (Dreamboard).
26
United States, Eastern District of Virginia, United States of America v. Aleksei Yurievich Burkov (Card Planet), Case No. 1:15-
CR-00245, Superseding Indictment, February 2016.
27
Ibid., pp. 13–14.
28
United States of America v. Aleksei Yurievich Burkov (Card Planet).
29
BAE Systems Detica and John Grieve Centre for Policing and Community Safety, London Metropolitan University, Organised
Crime in the Digital Age (2012) UNODC, Comprehensive Study on Cybercrime, draft; and Broadhurst and others, “Organizations
and cybercrime”.
30
Ibid.
31
See also UNODC Teaching Modules, Cybercrime, Module 13: cyber organized crime, “Criminal groups engaging in cyber
organized crime”. Available at sherloc.unodc.org/cld/en/education/tertiary/cybercrime/module-13/index.html; and Broadhurst
and others, “Organizations and cybercrime”.
32
In her 2002 article, Susan Brenner discusses the possibility of “swarms” manifesting and operating online (see Susan W.
Brenner, “Organized cybercrime? How cyberspace may affect the structure of criminal relationships”, North Carolina Journal of Law
& Technology, vol. 4, No. 1 (2002), pp. 43–45).
33
Broadhurst and others, “Organizations and cybercrime”.
15
DIGEST OF CASES
do so for such reasons. An example of the composition of a swarm is the “hacktivist” group Anonymous.34
While Anonymous does not have a declared leader, the group has some degree of leadership, at least in the
sense that there are members of the group who take the initiative in organizing, planning and ultimately
making decisions on committing cybercrimes.35 In 2014, United States of America v. Gottesfeld,36 a
self-identified member of Anonymous conducted a distributed denial-of-service attack37 against the com-
puter network of a children’s hospital, purportedly in response to the hospital’s handling of a former patient.
He was charged with and convicted for conspiracy to damage and for damaging protected computers, was
sentenced to 121 months’ imprisonment and was required to pay restitution (an estimated US$ 443,000).38
Nevertheless, in most jurisdictions, swarms are not regarded as organized criminal groups if they do not
engage in cybercrime for a material benefit.
(b) Hubs
A hub is a group that has a core group of criminals who are surrounded by peripheral criminal associates.39
A hub is more structured than a swarm; it has a command structure that can be identified. Typically, the
activities of hubs are profit-driven. Some of the criminal activities corresponding to this organizational
structure are phishing, sexual offending and malware operations (worms, viruses, scareware, etc.).40
An example of a hub is Dreamboard, a criminal enterprise consisting of an online bulletin board that adver-
tised and distributed child sexual abuse material only to its members. In order to join Dreamboard, prospec-
tive members had to provide child sexual abuse material. In order to remain a member of Dreamboard,
members had to continuously provide child sexual abuse material or their access to the bulletin board would
be revoked. A member’s access was revoked if the member went 50 days without posting child sexual abuse
material.41 Dreamboard members had to follow rules, which were available in four languages (English,
Japanese, Russian and Spanish). One of the rules was that images on the site must be of girls 12 years old
or younger.42 The administrator of Dreamboard placed its members in separate groups. Members of the
SuperVIP group were trusted members of the site who produced and advertised their own child sexual
abuse material. SuperVIP group members had greater access to child sexual abuse material than other mem-
bers.43 VIP group members and other members had more restricted access to child sexual abuse material. To
advance to a higher group level, they needed to produce child sexual abuse material and make it available
to other members, post more advertisements for child sexual abuse material or post advertisements for child
sexual abuse material that other members did not already have in their possession.44 A few Dreamboard
members were sentenced to life imprisonment for their crimes.45
34
Members of Anonymous have been charged with committing various cyber-dependent crimes during their hacktivist oper-
ations (see, for example, United States, Northern District of California, United States of America v. Dennis Collins et al., Case
No. 11-CR-00471-DLJ (PSG), 16 March 2012). Members of Anonymous were charged for conducting coordinated distributed deni-
al-of-service attacks against PayPal during Operation Avenge Assange). Thirteen members pleaded guilty to charges of violations
of the Computer Fraud and Abuse Act of 1986. Most of the defendants pleaded guilty to a conspiracy charge as well (United States
Attorney’s Office, Northern District of California, “Thirteen defendants plead guilty for December 2010 cyber-attack against PayPal”,
6 December 2013.
35
David S. Wall, “Dis-organised crime: towards a distributed model of the organization of cybercrime”, The European Review of
Organised Crime, vol. 2, No. 2 (2015), pp. 71–90.
36
United States District Court, District of Massachusetts, United States of America v. Martin Gottesfeld, 319 F. Supp. 3d 548,
19 June 2018.
37
A distributed denial-of-service attack involves the use of multiple computers and other technologies to overwhelm the target’s
resources.
38
Nate Raymond, “Massachusetts man gets 10 years in prison for hospital cyberattack”, Reuters, 10 January 2019.
39
Broadhurst and others, “Organizations and cybercrime”.
40
Ibid.; see also UNODC Educational Modules, Cybercrime, Module 13: cyber organized crime, “Criminal groups engaging in
cyber organized crime”.
41
United States of America v. John Doe #1, Edward Odewaldt, et al. (Dreamboard).
42
Ibid.
43
Ibid., p. 6.
44
Ibid.
45
United States, Department of Justice, Office of Public Affairs, “Third Dreamboard member sentenced to life in prison for par-
ticipating in international criminal network organized to sexually exploit children”, 6 September 2012.
16
chapter III. Cyber organized criminal groups
46
Broadhurst and others, “Organizations and cybercrime”; and BAE Systems Detica and John Grieve Centre for Policing and
Community Safety, London Metropolitan University, Organised Crime in the Digital Age (2012); UNODC, Comprehensive Study on
Cybercrime, draft.
47
See also UNODC Teaching Modules, Cybercrime, Module 13: cyber organized crime, “Criminal groups engaging in cyber
organized crime”. Available at sherloc.unodc.org/cld/en/education/tertiary/cybercrime/module-13/index.html; and Broadhurst
and others, “Organizations and cybercrime”.
48
For further information about automated teller machine (ATM) skimming, see chap. V, sect. B.1.
49
United States, Eastern District of New York, United States of America v. Jael Mejia Collado et al., Case No. 13 CR 259
(KAM), Superseding Indictment, May 2013; United States of America v. Ercan Findikoglu, Case No. 1:13-CR-00440, Indictment,
24 June 2015.
50
England and Wales Court of Appeal, Regina v. Sunday Asekomhe [2010] EWCA Crim 740, p. 1.
51
See, for example, United States of America v. Gary Davis, Case No. 1:13-CR-950-2; United States of America v. Ross William
Ulbricht, Case No. 15-1815; United States of America v. Brian Richard Farrell, Case No. 2:15-CR-29-RAJ; United States of America
v. Gal Vallerius (Dream Market).
17
DIGEST OF CASES
52
BAE Systems Detica and John Grieve Centre for Policing and Community Safety, London Metropolitan University, “Organised
crime in the digital age” (2012); UNODC, Comprehensive Study on Cybercrime, draft; Broadhurst and others, “Organizations and
cybercrime”; see also UNODC Teaching Modules, Cybercrime Module 13: cyber organized crime, “Criminal groups engaging in
cyber organized crime”. Available at sherloc.unodc.org/cld/en/education/tertiary/cybercrime/module-13/index.html.
53
United States District Court, Eastern District of New York, United States of America v. Salvatore Locascio et al., 357F.
Supp. 2d 536, 28 September 2004.
54
Italy, Cass., 31 Marzo 2017, No. 43305.
55
Europol, Internet Organised Crime Threat Assessment 2020 (The Hague, 2020), p. 31; United States of America v. Bogdan
Nicolescu, Tiberiu Danet and Radu Miclaus (Bayrob Group); Hungary, Prosecution v. Baksa Timea and others (SHERLOC Case
No. HUNx003).
56
Ibid.
57
See, for example, Canada, Provincial Court of Saskatchewan, R v. Chicoine, 2017 SKPC 87, 14 November 2017; United States
District Court, Eastern District of Michigan, United States of America v. Caleb Young, Case No. 18-20128, Sentencing Memorandum,
11 May 2018; Costa Rica, Tribunal Penal del Tercer Circuito Judicial de San José, Causa penal número 15-001824-0057-PE & Causa
Penal número 19-000031-0532-PE (Operación R-INO).
58
See, for example, Argentina, Tribunal Oral Federal de Jujuy, Causa FSA 8398/2014/TO1; United States of America v. John Doe
#1, Edward Odewaldt, et al. (Dreamboard); Germany, Federal Court of Justice, Decision 2 StR 321/19, of 15 January 2020 (BGH,
Beschluss vom 15.01.2020, 2 StR 321/19) (the Giftbox Exchange and Elysium).
59
Pennsylvania, United States of America v. Alexander Konovolov et al., Case No. 2-19-CR-00104 (GozNym Malware), Indictment
Memorandum, 17 April 2019, p. 3.
18
chapter III. Cyber organized criminal groups
(c) Technical support. Individuals who provide technical support for the group’s operations, including
the maintenance of infrastructure and the technologies used;
(d) Hosts. Individuals who host illicit activities either on servers or offline physical locations.
Bulletproof hosting services, for example, offer to host illicit activities on servers that are designed to evade
law enforcement and security detection and enable illicit activities to continue uninterrupted.
These roles are often identified in organized criminal groups that provide crime as a service (i.e., provide
services that facilitate crimes and/or cybercrimes).60 In addition to hacking, malware and hosting, the illicit
services offered include the provision of exploit toolkits or information about system vulnerabilities and
ways to exploit those vulnerabilities, as well as tutorials for various cybercrimes.
Cyber organized criminal groups can have members or associates that serve as specialists. These individu-
als specialize in a specific cybercrime or other crime or in a tactic or method to commit a cybercrime. An
example of a specialist is an individual who develops “crypters”, software tools that encrypt malware so that
it can evade detection by antivirus programs on devices.61 Organized criminal groups can also have mem-
bers or associates who are suppliers and distributors of illicit goods and services.62 In addition, organized
criminal groups may use “cashers”, who convert illicit goods to money, steal money from targets and dis-
tribute it to group members, or otherwise make the proceeds from the group’s illicit activities available to
group members.63 The “cashers”, who are also known as “runners” or “strikers”, may be used to withdraw
or transfer money online or at a physical establishment, such as a bank.64 Furthermore, these groups may
use “money mules”, who obtain and transfer money illegally upon request and payment,65 to launder the
proceeds of their cybercrimes.66
Some of the roles within cyber organized criminal groups are transient and the persons in these roles only
participate in the group until they fulfil their purpose. One example of a person in a temporary role is a
specialist67 who can be hired by the organized criminal group to create malware for later distribution by the
group. Moreover, all members of the group are not valued equally and/or considered important. Even in
certain online illicit forums, members of the forum were ranked; in some cases, VIP status was granted to
elite members of the group.68 Furthermore, some members of the group may be considered expendable. For
instance, “money mules” who are solicited online and asked to open bank accounts (or use their own
accounts) and receive money from others (or asked to mail or physically move packages by receiving them
and forwarding, sending or taking the packages to their destination) are often considered by the group to be
expendable (especially if they unwittingly participate in this activity).
60
Maras, Cybercriminology.
61
United States of America v. Alexander Konovolov et al. (GozNym malware), p. 3.
62
Ibid.
63
Ibid.
64
Canada, Ontario Court of Justice, R. v. Kalonji, 2019 ONCJ 341, 17 May 2017, para. 7.
65
Maras, Cybercriminology, p. 337.
66
See, for example, United States of America v. Alexander Konovolov et al. (GozNym malware) and United States v. Aleksei
Yurievich Burkov (Card Planet).
67
Specialists can also be permanent members of the group.
68
See, for example, United States District Court, District of Nevada, United States v. Svyatoslav Bondarenko et al., Case
No. 2:17-CR-306-JCIVI-PAL (Infraud), Second Superseding Criminal Indictment, 30 January 2018; United States of America v. John
Doe #1, Edward Odewaldt, et al. (Dreamboard).
19
DIGEST OF CASES
As a result of the operation, a number of persons were arrested and taken to court in France.
Information on that case is provided below.
From 2010 to 2014, the defendant (Z.) ran a criminal enterprise that engaged in online fraud. To this
end, Z. used stolen credit card data found on carding forums by himself, P. (the “technical advisor”
of the group) and N. (a member of the group in charge of finding credit card data), as well as credit
card data stolen by L. from his former employer. The defendants (P. and Z.) would then hack into
customer accounts on commercial websites and modify the contact information so that the actual
customers would not receive any notifications of purchases and/or deliveries. Z. and N. would buy
goods on commercial websites and send them to shipping points. Z. and X. forged fake identification
to be used by “mules” to receive the packages at the shipping points. Several persons (Y., M., O., Q.,
V., T. and R.) were used as “mules”. They would each receive the packages, keeping some packages
as payment and sending others to Z. so he could sell them on retailer websites. Several people
involved in this criminal organization later started using the same techniques to buy goods for
themselves. Z. and V. were also found to be in possession of ATM skimmers that they intended to
use to obtain more credit card data. The group managed to place about 2,000 orders on online com-
mercial websites for an amount estimated to be €40,000–€60,000.
One of the 15 defendants was acquitted and the other 14 were convicted of several offences,
depending on their degree of involvement in the fraud. The convictions ranged from complicity to
commit fraud as part of an organized criminal group to participation in an organized criminal group,
illegal access to a data system and illegal acquisition of computer data as part of an organized
criminal group. For those convicted for their participation in an organized criminal group, the
French court highlighted the difference between the notions of “bande organisée” and of “associa-
tion de malfaiteurs” in French law. According to French law, “bande organisée” is used as an aggra-
vating circumstance to an already existing offence, whereas an “association de malfaiteurs” is a
separate criminal offence as such. The acts of defendants cannot be prosecuted as both “bande
organisée” and “association de malfaiteurs” if the acts are inextricably linked together. The court
held that it could not convict the defendants for both “bande organisée” and “association de mal-
faiteurs” as it related to the cyber organized crime they had committed. Ultimately, only Z. and V.,
who had taken part in the ATM skimming scheme, were convicted for participating in an “associa-
tion de malfaiteurs”.
The defendants were given sentences of imprisonment ranging from six months to two years.
For all but four of the defendants in this case (Z., V., P. and N.), the sentences were suspended.
Z. and V. were sentenced to 2 years and to 15 months of imprisonment, respectively, and
were required to pay €3,000 and €2,000, respectively, in fines to the state and €10,200 in compen-
sation to the victims. P. and N. were sentenced to 15 months and to 18 months of imprisonment,
respectively, and were required to pay fines of €2,000 to the state and €10,200 in compensation
to the victims.
For more information about this case, see UNODC, SHERLOC case law database, Case No. FRAx030.a
a
Available at https://sherloc.unodc.org/.
20
chapter III. Cyber organized criminal groups
C. Geographical organization
The perpetrators of cyber organized crime may be part of a group in which the offenders may or may not be
in geographical proximity. The cases included in the digest represent a variety of regions. Research has
shown that geographical proximity between perpetrators has played some role in the formation and expan-
sion of cyber organized criminal groups.69 For example, in HKSAR v Chan Pau Chi,70 15 defendants in
Hong Kong, China, were charged with and convicted for a range of offences, including money-laundering
and conspiracy relating to the illegal facilitation of prostitution online via websites (i.e., through the adver-
tisement and promotion of services). Nevertheless, other cyber organized criminal groups form and thrive
even when there is little or no geographical proximity between their members.71 There have been a number
of cases indicating that the members of a darknet site (administrators, moderators, vendors, buyers and
suppliers) can be from anywhere in the world.72
The police officers subsequently went to a location in Matautu, Samoa, that included a restaurant, a
shop and accommodations, where the two defendants could be identified. The police called for backup,
searched the living quarters of the defendants and found and seized, inter alia, over 100 suspicious ATM
cards and three ATM skimming devices. The defendants were arrested. In some of the video footage
produced in evidence, a third national of China could be seen participating in the offences. That man had
already left the country at the time of the defendants’ arrest and was not a party to the proceedings.
The two male defendants (Z.S. and Y.Q.) were charged with several offences involving theft; inten-
tionally accessing an electronic system without authorization; dishonestly accessing an electronic
system and thereby obtaining a benefit; and intentionally possessing a card skimming device for the
purpose of committing an offence. While some of the theft charges were subsequently dismissed
or reduced, on 7 July 2017, the defendants were each sentenced to five years’ imprisonment for
theft or stealing,a accessing an electronic system without authorization,b accessing an electronic
system for dishonest purpose,c and possession of illegal devices.d
For more information about this case, see UNODC, SHERLOC case law database, Case No. WSMx001.e
a
Samoa, Crimes Act of 2013, paras. 161 and 165 (b).
b
Ibid., para. 206.
c
Ibid., paras. 33 and 207.
d
Ibid., paras. 33 and 213 (a).
e
Available at https://sherloc.unodc.org/.
69
Broadhurst and others, “Organizations and cybercrime”; Eric Rutger Leukfeldt, Anita Lavorgna and Edward R. Kleemans,
“Organised cybercrime or cybercrime that is organized? An assessment of the conceptualization of financial cybercrime as organised
crime”, European Journal in Criminal Policy and Research, vol. 23, No. 3 (September 2017), pp. 292–293.
70
Hong Kong, China, HKSAR v. Chan Pau Chi [2019] HKEC 1549.
71
See, for example, United States of America v. Alexander Konovolov et al. (GozNym malware).
72
See, for example, United States of America v. Gary Davis, Case No. 1:13-CR-950-2; United States of America v. Ross William
Ulbricht, Case No. 15-1815; United States of America v. Brian Richard Farrell, Case No. 2:15-CR-29-RAJ; United States of America
v. Gal Vallerius (Dream Market).
21
DIGEST OF CASES
M.S. was charged with and convicted of conspiracy to distribute fentanyl;e distribution of fentanyl;f
sale of counterfeit drugs;g misbranding of drugs;h international money-laundering conspiracy;i and
distribution of fentanyl resulting in death.j She pleaded guilty and was sentenced to 13 years and
4 months of imprisonment.k B.A. was charged with and convicted of conspiracy to distribute fenta-
nyl;l distribution of fentanyl;m sale of counterfeit drugs;n and misbranding of drugs.o He pleaded
guilty and was sentenced to 9 years’ imprisonment.p
73
See, for example, France, Tribunal de grande instance de Paris, 13e chambre correctionnelle, 20 novembre 2018; United States,
Southern District of Illinois, United States of America v. Melissa Scanlan, Case No. 18-CR-30141-NJR-1 and Case No. 19-CR-30154-
NJR-1, Stipulation of facts, 20 October 2019, p. 4; and HKSAR v. Chan Pau Chi [2019] HKEC 1549.
74
See, for example, United States of America v. Dennis Collins et al., Case No. 11-CR-00471-DLJ (PSG); United States, Eastern
District of Virginia, United States of America v. Daniel Palacios Rodríguez, Alexandra Guzmán-Beato, Elvis Pichardo Hernández,
José David Reyes-González, Juan Rufino Martínez-Domínguez, and Fátima Ventura Pérez, Case No. 1:19-MJ-286, Affidavit in support
of criminal complaint and arrest warrant, 24 June 2019.
75
See, for example, Canada, R v. Philip Michael Chicoine; Canada, Nova Scotia Court of Appeal, R v. Pitts, 2016 NSCA 78; and
United States of America v. Caleb Young; and Germany, Federal Court of Justice, Decision 2 StR 321/19, of 15 January 2020 (BGH,
Beschluss vom 15.01.2020, 2 StR 321/19).
22
chapter III. Cyber organized criminal groups
For more information on this case, see UNODC, SHERLOC case law database, Case No. USAx187.q
a
United States of America v. Melissa Scanlan, p. 4.
b
United States of America v. Brandon Arias, Case No. 18-CR-30141-NJR-2, Stipulation of Facts (S.D. Illinois, 16 July 2019),
pp. 4–5.
c
United States of America v. Melissa Scanlan, p. 5.
d
Ibid., p. 4.
e
United States Code, Title 21, sect. 846.
f
Ibid., sect. 841.
g
Ibid., sect. 331 (1) (3).
h
Ibid., sect. 331(A).
i
United States Code, Title 18, sect. 1956 (H).
j
United States Code, Title 21, sect. 846; United States, Southern District of Illinois, United States of America v. Melissa
Scanlan, Plea Agreement, Case No. 18-CR-30141-NJR-1 and Case No. 19-Cr-30154-NJR-1, 30 October 2019, pp. 1–2.
k
United States Attorney’s Office, Southern District of Illinois, “Dark web fentanyl trafficker known as ‘The Drug Llama’
sentenced to 13 years in federal prison”, press release, 12 February 2020.
l
United States Code, Title 21, sect. 846.
m
Ibid., sect. 841.
n
Ibid., sect. 331 (1) (3).
o
Ibid., sect. 331 (A).
p
United States Attorney’s Office, Southern District of Illinois, “Brandon Aria, a/k/a ‘the Drug Llama’, sentenced to 9 years
for distributing fentanyl on the dark web”, 12 November 2019.
q
Available at https://sherloc.unodc.org/.
23
CHAPTER IV.
TOOLS USED BY PERPETRATORS
OF CYBER ORGANIZED CRIME
DIGEST OF CASES
In order to register for the forums, users had to provide an email address and username for use on
the platform and then contact N2 to activate the accounts. In addition to hosting advertisements for
illicit goods, both forums provided a platform to exchange information with other users on topics
such as anonymizing and ways to protect against law enforcement detection and the dissemination
of malware. Because of mistrust between the anonymous users, some of the transactions in the
forums were concluded via escrow service for a fee.
H., G. and X. had leadership roles on the underground economy forums. Defendant H. was respon-
sible for the technical aspects of the forums, such as maintaining servers and the security of the
forums. He held the positions of administrator, moderator and trustee, who received fees paid by
users of the escrow service. Defendant G. held the position of moderator and was responsible for
checking the compliance of user postings with forum rules and sanctioning users where necessary.
He also acted as a trustee for three transactions, sold official documents in one case and acquired
counterfeit money twice. Defendant X. held the position of “supermoderator” and mainly provided
technical support (e.g. the establishment and maintenance of the technical infrastructure of one of
the forums). He also created a “scene guide” that provided users with tips on committing criminal
offences, as well as information on how to avoid identification by law enforcement officers. The
defendant was also involved in the establishment and maintenance of the technical infrastructure
of one of the forums (“g.me”). The defendants did not know each other in person but were in close
contact for organizational purposes and communicated through areas of the forums that were
accessible only to members in leadership positions and through various other encrypted messen-
ger services.
The defendants were charged with and convicted of computer fraud (H.), attempted computer fraud
(H.), illegally acquiring narcotic drugs (X.), aiding and abetting illicit trading in narcotic drugs in
quantities which are not small (G., H. and X.), aiding and abetting illicit trading in narcotic drugs
(G., H. and X.), aiding and abetting counterfeiting of money (G., H. and X.), aiding and abetting pro-
26
chapter IV. Tools used by perpetrators of cyber organized crime
curement of false official identity documents (G., H. and X.) and counterfeiting of money (G.).
The court sentenced H. to 21 months’ imprisonment, G. to 12 months’ imprisonment and X. to
14 months’ imprisonment. The creator of the underground economy forums and several other per-
sons were also charged with and, in separate trials, convicted of crimes relating to the forums.
For more information on this case, see UNODC, SHERLOC case law database, Case No. DEUx025.a
a
Available at https://sherloc.unodc.org/.
Criminals exploit legitimate commercial services to further their illicit ends online.76 Case law has revealed
that perpetrators of cyber organized crime have searched for targets on dating sites, social media platforms
and live broadcasting services on the clearnet.77 Social media platforms have also been used by organized
criminal groups to communicate with members, advertise illicit goods and services, exchange illicit goods
(e.g. stolen and counterfeit identity documents) and facilitate or carry out illicit activities.78 Moreover, illicit
goods and services have also been advertised on licit online marketplaces and online classified advertise-
ment sites.79
United States of America v. Carl Allen Ferrer, Case No. 18 CR. 464
(D. Arizona, 5 April 2018) (Backpage) (United States of America)
Backpage was a classified advertisement website that included a section for advertisements for
sexual services. Among the sexual services advertised on Backpage were sexual services by traf-
ficked women and children. Charges had been unsuccessfully brought against Backpage for its
facilitation of trafficking in persons and prostitution.a A report published by the Permanent
Subcommittee on Investigations, the chief investigative subcommittee of the United States Senate
Committee on Homeland Security and Governmental Affairs, revealed that Backpage had know-
ingly sanitized advertisements published on its site in order to conceal crimes.b Specifically, the
report revealed that Backpage had knowingly facilitated trafficking in persons by editing advertise-
ments that openly advertised human beings for sexual services and posting them online instead of
denying them access to the platform.c
In April 2018, Backpage was seized by law enforcement authorities in the United States. Founders,
higher-level executives and managers of Backpage were charged with offences that included con-
spiracy to facilitate prostitution and conspiracy to commit money-laundering.d The chief executive
officer and one of the founders of Backpage, C.F., pleaded guilty to conspiracy to commit offence
or to defraud the United States, in violation of Title 18 of the United States Code (sect. 371).e In his
plea agreement, he acknowledged that the majority of revenue for the site had come from illegal
advertisements and that Backpage had used bank accounts for shell companies and cryptocur-
rency processing companies (i.e., CoinBase, Crypto Capital, GoCoin, Kraken and Paxful) to conceal
the source of its revenue.f He also acknowledged in his plea deal that he had conspired to sanitize
advertisements by removing words and photographs that were indicative of prostitution.g
76
Europol, Internet Organised Crime Threat Assessment 2020, p. 17.
77
United States Court of Appeals for the Fifth Circuit, United States of America v. Oladimeji Seun Ayelotan, Femi Alexander
Mewase and Rasaq Aderoju Raheem, Case No. 17-60397 (5th Circuit, 4 March 2019. The defendants created fake profiles on dating
sites to identify targets and lure them into a fake relationship (United States of America v. Caleb Young (Bored Group)).
78
See, for example, United States District Court, Eastern District of Virginia, United States v. Ramiro Ramirez-Barreti et al.,
Criminal Case No. 4:19-CR-47, Second Superseding Indictment, 14 August 2019, p. 12; United States District Court, Western District
of North Carolina, United States v. Anthony Blane Byrnes, Case No. 3:20-CR-192.
79
See, for example, United States of America v. Daniel Palacios Rodríguez, Alexandra Guzmán-Beato, Elvis Pichardo Hernández,
José David Reyes-González, Juan Rufino Martínez-Domínguez, and Fátima Ventura Pérez.
27
DIGEST OF CASES
United States of America v. Carl Allen Ferrer, Case No. 18 CR. 464
(D. Arizona, 5 April 2018) (Backpage) (United States of America) (continued)
As part of the plea deal, C.F. is required to forfeit the company’s assets and property, take all the
steps in his power to permanently shut down Backpage and testify that Backpage engaged in mon-
ey-laundering and facilitated prostitution. He has not yet been sentenced. A “sales and marketing
director” of Backpage, D.H., also pleaded guilty to conspiracy to facilitate prostitution in a scheme
designed to provide free advertisements to sex workers in order to draw them away from Backpage’s
competitors. The trials of another six persons affiliated with Backpage (M.L, J.L., S.S., J.B., A.P. and
J.V), which include the other two founders of Backpage (M.L and J.L.), were postponed until 2021.
The Backpage case held an Internet intermediary liable for its role in the facilitation of serious
crimes. Article 10 of the Organized Crime Convention requires States parties to the Convention to
establish the liability of legal persons for participation in serious crimes involving an organized
group.h Where Internet intermediaries with legal personhood are themselves involved in the com-
mission of serious crimes involving an organized criminal group, article 10 requires that States
parties have in place legislation under which the intermediaries can be found liable. Furthermore,
States parties must ensure that legal persons held liable in accordance with article 10 are subject
to effective, proportionate and dissuasive sanctions.i
Unlike the aforementioned case of Backpage, in the vast majority of cases, online intermediaries
are not themselves involved in the commission of serious crimes, but rather their services are
abused by criminals to carry out offences. In such circumstances, cooperation between online
intermediaries and law enforcement authorities is critical. The Organized Crime Convention envi-
sions a degree of cooperation between the law enforcement agencies and prosecutors and the
private sector in the prevention of organized crime.j The Conference of the Parties to the United
Nations Convention against Transnational Organized Crime has encouraged the private sector to
strengthen its cooperation and work with States parties to the Convention and the Protocols thereto
in order to achieve the full implementation of those instruments.k
For more information on this case, see UNODC, SHERLOC case law database, Case No. USAx169.l
a
United States District Court, District Court of Massachusetts, Doe v. Backpage.com LLC, 104 F. Supp. 3d 149, 15 May 2015;
United States, Superior Court of the State of California, The People of California v. Carl Allen Ferrer, Michael Lacey and James
Larkin, Case No. 16FE024013, 23 December 2016; Marie-Helen Maras, “Online classified advertisement sites: pimps and
facilitators of prostitution and sex trafficking?”, Journal of Internet Law, vol. 21, No. 5 (November 2017), pp. 17–21.
b
United States Senate, Permanent Subcommittee on Investigations, Backpage.com’s Knowing Facilitation of Online Sex
Trafficking (Washington, D.C., Committee on Homeland Security and Governmental Affairs, 2017).
c
See also UNODC Teaching Modules, Trafficking in persons and smuggling of migrants, Module 14: links between
cybercrime, trafficking in persons and smuggling of migrants, “Technology facilitating trafficking in persons”. Available at
sherloc.unodc.org/cld/en/education/tertiary/tip-and-som/module-14/index.html.
d
United States District Court, District of Arizona, United States of America v. Michael Lacey, James Larkin, Scott Spear, John
“Jed” Brunst, Dan Hyer, Andrew Padilla and Joye Vaught, Case No. 18 CR. 422, Indictment, 28 May 2018.
e
United States District Court, District of Arizona, United States of America v. Carl Allen Ferrer, Case No. 18 CR. 464, Plea
Agreement, 5 April 2018, p. 2.
f
Ibid., pp. 13–14.
g
Ibid., p. 13.
h
United Nations Convention against Transnational Organized Crime, art. 10, para. 1.
i
Ibid., art. 10, para. 4.
j
Ibid., art. 31, para. 2 (a).
k
CTOC/COP/2012/15, resolution 6/1.
l
Available at https://sherloc.unodc.org/.
In its report entitled Internet Organised Crime Threat Assessment 2020, the European Union Agency for
Law Enforcement Cooperation (Europol) revealed that perpetrators of cyber organized crime communi-
cated via encrypted means (e.g., Protonmail, Tutanota and cock.li).80 Case law has revealed that unen-
crypted and encrypted messaging applications were used not only for communications between perpetrators
28
chapter IV. Tools used by perpetrators of cyber organized crime
of cyber organized crime, but also to identify and target victims and commit cybercrimes.81 In addition to
the use of mainstream communication platforms and devices, instant messaging, messaging platforms on
websites, proprietary communication platforms and tools have been developed and marketed exclusively to
criminals (e.g., Phantom Secure (see the box below)).82
The organizational structure of the Phantom Secure criminal enterprise included individuals with
roles as administrators, distributors and agents. Administrators included Phantom Secure’s corpo-
rate executives and staff in the front office who had physical control of the Phantom Secure net-
work, Phantom Secure’s books and records and its corporate operations. Administrators could
initiate new subscriptions, remove accounts and remotely wipe and reset devices. As the chief exec-
utive officer of Phantom Secure, the defendant V.R. was its lead administrator. K.A.R. was also
alleged to have served as an administrator of Phantom Secure. An unnamed individual (only iden-
tified as Individual A in court documents) was said to have held an integral role in the design and
maintenance of the security integrity of Phantom Secure. Distributors coordinated agents and
resellers of Phantom Secure devices and received payments for ongoing subscription fees, which
they transferred, minus a personal commission, back to Phantom Secure. They also provided tech-
nical support and communicated directly with Phantom Secure administrators. Y.N., C.P. and M.G.
were all alleged to have been distributors for Phantom Secure. Agents physically sourced and
engaged with new customers to sell and deliver Phantom Secure devices. They earned a profit on
the sale of the handset and provided first-level technical support to their customers.
81
See, for example, United States District Court, Eastern District of Virginia, United States v. Ramiro Ramirez-Barreti et al.;
United States District Court, Southern District of California, United States of America v. Cristian Hirales-Morales, Marcos Julian
Romero and Sergio Anthony Santivanez, Case No. 19-CR-4089-DMS, Indictment, 10 October 2019; R v. Philip Michael Chicoine; and
United States of America v. Conor Freeman, Case No. 2:19-CR-20246, Indictment, 18 April 2019 (The Community).
82
See, for example, United States of America v. Svyatoslav Bondarenko et al., p. 22 (Infraud); United States of America v. Caleb
Young (Bored Group); United States of America v. Beniamin-Filip Ologeanu, Superseding Indictment No. 5:19-CR-10, 6 February
2019, pp. 10–11; United States District Court, Northern District of Ohio, United States of America v. Bogdan Nicolescu, Tiberiu Danet
and Radu Miclaus, p. 6 (Bayrob group); United States District Court, Eastern District of Kentucky, United States of America v. Andre-
Catalin Stoica et al., Criminal Indictment No. 5-18-CR-81-JMH, 5 July 2018, p. 16 (Alexandria Online Fraud Network); United States
of America v. Ramiro Ramirez-Barreti et al.; UNODC, SHERLOC case law database, Case No. DEUx033, LG Leipzig, Urteil vom
14.06.2012, 11 KLs 390 Js 191/11.
29
DIGEST OF CASES
The defendant was charged with racketeering conspiracy to conduct enterprise affairs in violation
of Title 18 of the United States Code (sect. 1962) and conspiracy to aid and abet the distribution of a
controlled substance in contravention of Title 21 of the United States Code (sects. 841 (a), para. (1),
and 846). The defendant was sentenced to nine years’ imprisonment. The defendant was also
ordered to be on supervised release for a term of three years following his release from imprison-
ment. The defendant was further required to forfeit assets and to pay a fine of US$ 100.
This case was significant because it was the first time the United States had prosecuted and con-
victed an executive of a company for knowingly providing transnational criminal organizations with
encrypted infrastructure to conduct the international importation and distribution of narcotic drugs.
This case shows how organized criminal groups are adapting to use improved forms of technology
to communicate and evade detection and apprehension. It also shows the challenges faced by law
enforcement authorities in investigating and prosecuting increasingly sophisticated organized
criminal groups.
For more information on this case, see UNODC, SHERLOC case law database, Case No. USAx154.f
a
United States District Court, Southern District of California, United States of America v. Vincent Ramos, Case No. 18-MJ-0973,
Complaint, 15 March 2018, pp. 5–6.
b
Ibid., p. 6.
c
United States District Court, Southern District of California, United States of America v. Vincent Ramos et al., Case No. 3:18-CR-
01404-WQH, Criminal Indictment, 15 March 2018, p. 3; United States of America v. Vincent Ramos, Complaint, p. 6.
d
United States of America v. Vincent Ramos.
e
United States District Court, Southern District of California, United States of America v. Vincent Ramos, Case No. 18-CR-01404-
WQH, Plea Agreement, 2 October 2018, p. 6.
f
Available at https://sherloc.unodc.org/.
Criminals have utilized wire transfers, cashier’s cheques, money orders, gift cards and prepaid cards, as
well as online payment and money transfer services, to send and receive the proceeds of cybercrime.83 Other
services distribute digital currency84 either through a single centralized authority or peer-to-peer, without
any central oversight. These currencies can be convertible (i.e., they have an equivalent value in fiat cur-
rency or they can be used as a substitute for fiat currency) or non-convertible (i.e., they do not have an
equivalent value in fiat currency, they cannot be substituted for fiat currency and they can be used only in
the domain or domains for which they were created, such as a gaming platform).85 Case law has revealed
that digital currencies, such as Liberty Reserve, were used to conceal crimes and distribute proceeds of
crimes between members and associates.86
83
For example, the Alexandria Online Fraud Network received victim payments in the form of reloadable prepaid cards, prepaid
debit cards and gift cards of varying types; United States postal money orders; cashier’s cheques; money transfer service wires; and
bank wires and deposits. For other examples of cases involving groups that used some of these payment options, see Tribunal cor-
rectionnel d’Anvers, Antwerpen, 2 mai 2016 (Belgium); United States of America v. Andre-Catalin Stoica et al., p. 4; United States
of America v. Oladimeji Seun Ayelotan, Femi Alexander Mewase and Rasaq Aderoju Raheem, Case No. 17-60397; United States of
America v. Bogdan Nicolescu, Tiberiu Danet and Radu Miclaus, p. 8; United States District Court, District of South Carolina, United
States of America v. Jimmy Dunbar, Jr. and Mitchlene Padgett, Criminal Case No. 2:18-1023, Indictment, 14 November 2018, p. 3;
and United States of America v. Rakeem Spivey and Roselyn Pratt, Case No. 2:18-CR-0018, Indictment, 14 November 2018, p. 3.
84
Digital currency can be described as a digital representation of either virtual currency (non-fiat) or e-money (fiat) (Financial
Action Task Force, “Virtual currencies key definitions and potential AML/CFT risks” (June 2014), p. 4). Virtual currencies refer to a
digital representation of value that, like traditional coin and paper currency, functions as a medium of exchange (i.e., it can be digitally
traded or transferred and can be used for payment or investment purposes) (United States, Department of Justice, Office of the Deputy
Attorney General, Report of the Attorney General’s Cyber Digital Task Force: Cryptocurrency–Enforcement Framework (Washington,
D.C., 2020), p. 2). The term “e-money” refers to the digital representation of fiat currency used to electronically transfer value denom-
inated in fiat currency (Financial Action Task Force, “Virtual currencies key definitions”, p. 4).
85
United States, Department of Justice, Office of the Deputy Attorney General, Report of the Attorney General’s Cyber Digital
Task Force: Cryptocurrency, p. 3.
86
Infraud used Liberty Reserve, bitcoin and other digital currencies to conceal the nature of their proceeds and move the proceeds
among enterprise members and associates (United States of America v. Svyatoslav Bondarenko et al., p. 21); see also United States
District Court, Southern District of New York, United States of America v. Liberty Reserve S.A. et al., Case No. 13-CR-368 (DLC),
23 September 2015 (UNODC, SHERLOC case law database, Case No. USA004R).
30
chapter IV. Tools used by perpetrators of cyber organized crime
The two founders of Liberty Reserve were charged with and arrested for conspiracy-related
offences. In 2013, one of the founders, V.K., a citizen of the United States, pleaded guilty to, among
other offences, conspiracy to commit money-laundering and conspiracy to operate an unlicensed
money-transmitting business and was sentenced to 10 years of imprisonment.c The other founder,
A.B., a citizen of Costa Rica, was arrested in Spain in 2013 and extradited to the United States in
2014. In 2016, A.B. pleaded guilty to one count of conspiring to commit money-laundering and was
sentenced to 20 years of imprisonment and a fine of US$ 500,000.d
For more information on this case, see UNODC, SHERLOC case law database, Case No. USA004R.e
a
United States of America v. Liberty Reserve S.A. et al., Indictment No. 13-CR-368, para. 16.
b
Ibid., para. 8.
c
Nate Raymond and Brendan Pierson, “Digital currency firm co-founder gets 10 years in prison in U.S. case”, Reuters,
13 May 2016.
d
United States Department of Justice, Office of Public Affairs, “Liberty reserve founder sentenced to 20 years for
laundering hundreds of millions of dollars”, press release, 6 May 2016.
e
Available at https://sherloc.unodc.org/.
In addition, cryptocurrencies are used by perpetrators of cyber organized crime to further their illicit ends.
The most widely used cryptocurrency is bitcoin. Case law has revealed that darknet sites include
“tumbling” or “mixing” services to obscure links between buyers’ and vendors’ bitcoin addresses.87 These
services essentially scramble multiple buyer-seller bitcoin transactions together in order to conceal the
bitcoin payments from buyer to seller or commission payments to the administrator.88
United States of America v. Gary Davis, Case No. 1:13-CR-950-2 (SHERLOC case law database, Case No. USAx156).
87
United States District Court, Southern District of Florida, United States of America v. Gal Vallerius, Case No. 17-MI-03241-JG,
88
31
DIGEST OF CASES
Bitcoin is the most common cryptocurrency used to receive criminal proceeds of both cybercrime and tra-
ditional crime (see the box above). In Internet Organised Crime Threat Assessment 2020, Europol revealed
that while the most popular cryptocurrency (bitcoin) is still predominantly used, darknet markets have
started to offer alternative privacy-enhanced cryptocurrencies for transactions, such as Monero, Dash and
Zcash.89 Case law supports this observation. In particular, the darknet sites included in this digest relied on
bitcoin, Monero and Ethereum for financial transactions.90 The popularity of cryptocurrencies has led to
their use in scams to lure unsuspecting investors in fraudulent schemes.91 Moreover, cryptocurrencies have
been used by criminals for money-laundering. 92 Finally, cryptocurrencies are not only a tool used by
89
Europol, Internet Organised Crime Threat Assessment 2020, p. 58.
90
Regina v. Jake Lavene, Crown Court Leeds, Case No. T20177358; Regina v. Mandy Christopher Lowther, Crown Court Leeds,
Case No. T20177358; Regina v. Lee Childs, Crown Court Leeds, Case No. T20177358.
A group of five defendants participated in a worldwide Ponzi scheme, the BitClub Network, which defrauded cryptocurrency
91
investors (United States District Court, District of New Jersey, United States of America v. Matthew Brent Goettsche, Russ Albert
Medlin, Jobadiah Sinclair Weeks, Joseph Frank Abel, and Silviu Catalin Balaci, Case No. 19-CR-877-CCC, 5 December 2019;
United States District Court, District of New Jersey, United States of America v. Silviu Catalin Balaci, Superseding Information, Case
No. 19-877 (2017)).
92
United States District Court, Southern District of New York, United States of America v. Ross William Ulbricht, Case
No. 14-CR-068, 4 February 2014.
32
chapter IV. Tools used by perpetrators of cyber organized crime
organized criminal groups, but also the target of these criminals. For example, the so-called Bayrob group
engaged in “cryptojacking”, malicious “cryptomining” whereby malicious code was used to infect systems
and use the resources of the infected systems to “mine” cryptocurrencies.93
Germany, the Republic of Korea, the United Kingdom and the United States engaged in a joint law
enforcement investigation that led to the arrest of the defendant and the seizure of the server used to
operate the website. Specifically, in the United States, criminal investigation agents of the Internal
Revenue Service traced bitcoin exchanges to identify IP addresses linked to the website. The agents
then analysed the IP addresses to identify the server hosting the website, which was located in the
Republic of Korea. Law enforcement officers from the Republic of Korea, the United Kingdom and the
United States subsequently raided the location of the server and arrested the website operator, seiz-
ing approximately 8 terabytes of child sexual exploitation videos. The law enforcement agencies
involved shared the data from the seized server with law enforcement agencies throughout the world,
resulting in the arrest of 337 individuals in 12 different countries. According to the National Center for
Missing and Exploited Children of the United States, approximately 45 per cent of the seized videos
contained child sexual exploitation material that had not been previously identified. Law enforcement
authorities seized money in bitcoins and Power Ledger tokens.
The defendant was sentenced to two years’ imprisonment for the production and distribution of
child pornographyb and the spreading of pornography;c the sentence was ultimately suspended. The
defendant was also sentenced to complete a sex offender treatment programme and to perform
200 hours of community service. The appellate court reversed the lower court’s judgement in part,
holding that the sentence imposed by the lower court was too light and improper. The appellate
court decided to sentence the defendant to one year and six months of imprisonment; that sentence
was not suspended. The appellate court also ordered the defendant to complete a sexual violence
treatment programme; in addition, he was subjected to a five-year restriction order on employment
in a child- and/or youth-related organization.
The website, Welcome to Video, was one of the first of its kind to use the cryptocurrency bitcoin to
monetize child sexual exploitation videos. Prior to being shut down, it was considered to be the
largest darknet site containing child sexual abuse material. The combination of the site using
cryptocurrencies for transactions and being hosted on the darknet posed challenges for law
enforcement authorities.
For more information about this case, see UNODC, SHERLOC case law database, Case No. KORx002.d
For more information on child sexual exploitation material, see chap. V, sect. B.6.
a
Article 11, paragraph 2, of the Act on the Protection of Children and Youth against Sex Offenses of the Republic of Korea.
b
Article 44-7, paragraph (1) 1, and article 74, paragraph (1) 2, of the Act on the Promotion of Information and
c
United States of America v. Bogdan Nicolescu, Tiberiu Danet, and Radu Miclaus.
93
33
CHAPTER V.
TYPES OF CYBER
ORGANIZED CRIME
DIGEST OF CASES
A. Cyber-dependent crime
Cyber-dependent crimes target ICT and would not be possible without the use of that technology. Cyber-
dependent crimes target the confidentiality (access is restricted to authorized users), integrity (data are
correct, trustworthy and valid) and availability (systems and data are accessible on demand) of computer
systems and data. Illicit acts against the confidentiality, integrity and availability of computer systems and
data include illegal access to a computer system and/or computer data; illegal interception of computer data
and/or acquisition of computer data; illegal data and system interference; and illegal production, distribu-
tion, use and possession of computer misuse tools. These cybercrimes are committed for a variety of rea-
sons, including financial, ideological, political and personal reasons (such as revenge, personal gratification,
to gain status and to obtain recognition among peers).94
1. Illegal access
Unauthorized or illegal access to ICT and/or its data is commonly known as hacking. Hacking refers to not
only gaining unauthorized or illegal access but also exceeding authorized access. Both of these activities are
proscribed by law, but this proscription varies by country and region.95 Hackers may access or attempt to
access systems and data; exceed or attempt to exceed authorized access to systems and data; and/or may
utilize this access to steal, modify, disrupt and/or otherwise damage systems and data. With respect to the
latter, once hackers gain illegal or unauthorized access to systems, they can view, download, alter and/or
steal data, damage the systems and/or interrupt or disable access to the system and/or data by legitimate
users.96 In one case in the United States, the defendant and his co-conspirators gained unauthorized access
to computers and computer networks to obtain sensitive data and military data and provide it to others
located outside of the United States for financial gain.97
94
Majid Yar, Cybercrime and Society (Thousand Oaks, California, SAGE Publications, 2006); Samuel C. McQuade III,
Understanding and Managing Cybercrime (Upper Saddle River, New Jersey, Pearson Education, 2006); David S. Wall, Cybercrime:
The Transformation of Crime in the Information Age (Cambridge, United Kingdom, Polity, 2007); Maras, Cybercriminology.
Article 29, paragraph 1 (a), of the African Union Convention on Cyber Security and Personal Data Protection requires States
95
parties to that Convention to criminalize gaining or attempting to gain unauthorized access to part or all of a computer system or
exceed authorized access.
96
Maras, Cybercriminology, p. 14.
97
United States of America v. Su Bin, Case No. SA CR 14-131, Plea Agreement, 22 March 2016, p. 5 (SHERLOC case law data-
base, Case No. USAx244).
36
chapter V. Types of cyber organized crime
For more information on this case, see UNODC, SHERLOC case law database, Case No. CANx137.d
a
Canada, Ontario Court of Justice, R. v. Kalonji, paras. 110–114.
b
Ibid., para. 6.
c
Ibid., paras. 46, 66 and 75.
d
Available at https://sherloc.unodc.org/.
Cheikh Al X, Jeanne AJ Ap and Alioune Ak Z were accused of aiding and abetting fraudulent com-
puter system access by providing the principal offenders – the unknown individuals – with bank
accounts to facilitate the deposits of fictitious money.
Following the unknown individuals’ orders, Cheikh Al X targeted and facilitated the use of several
bank accounts for the receipt of the stolen funds. He also asked Jeanne AJ Ap to facilitate the use
of an account of the banking network. Jeanne asked her cousin Ao AG to use her own account to
help a friend who needed to receive money from her husband. The money from each account was
sent to the unknown individuals and a part of it was shared with the defendants, as well as the bank
account owners (such as Ao AG).
The defendants were convicted of fraud and aiding and abetting the access and maintenance of
computer systems and the modification or deletion of data; fraudulent interception of computer
systems for the purpose of obtaining financial benefits; and modification of data by the introduction,
erasure or deletion of data. They were sentenced to two years of imprisonment and to pay to the
banking network 3.5 million CFA francs in compensation.
For more information on this case, see UNODC, SHERLOC case law database, Case No. SENx004.a
a
Available at https://sherloc.unodc.org/.
The term “hacking”, however, is not included in multilateral, regional and national cybercrime laws. Instead
the terms “illegal access” or “unauthorized access” are used. For example, article 2 of the Council of Europe
Convention on Cybercrime98 includes the term “illegal access”, which is defined as the intentional “access
to the whole or any part of a computer system without right”. In the Agreement on Cooperation among the
States members of the Commonwealth of Independent States in Combating Offences related to Computer
Information, “illegal access” is defined as unauthorized access to computer information.99 The term “illegal
access” is also included in the Arab Convention on Combating Information Technology Offences, adopted
by the League of Arab States in 2010; in that Convention, illicit access to, presence in or contact with part
or all of the information technology is considered to be a criminal offence. Some laws consider illegal
98
In this digest, as a way to illustrate the meaning of concepts and variation in the definitions of concepts, the definitions included in
multilateral conventions (such as the Council of Europe Convention on Cybercrime) and regional instruments (such as the Agreement
on Cooperation among the States members of the Commonwealth of Independent States in Combating Offences related to Computer
Information), the African Union Convention on Cyber Security and Personal Data Protection and the Arab Convention on Combating
Information Technology Offences), as well as national laws, are used.
Article 1, paragraph (d), of the Agreement on Cooperation among the States members of the Commonwealth of Independent
99
37
DIGEST OF CASES
access alone to be an offence,100 whereas other laws require access to be accompanied by a proscribed act
in order to be considered an offence.101
100
See, for example, the Arab Convention on Combating Information Technology Offences, which calls for States to criminalize
illicit access to, presence in or contact with part or all of the information technology, or the perpetuation thereof (see art. 6, para. (1));
and calls for the provision of enhanced penalties for illicit access leading to the obliteration, modification, distortion, duplication,
removal or destruction of saved data, electronic instruments and systems and communication networks, and damages to the users and
beneficiaries or the acquirement of secret government information (see art. 6, para. (2)). In of the African Union Convention on Cyber
Security and Personal Data Protection, States parties to the Convention are required to criminalize: gaining or attempting to gain
unauthorized access to part or all of a computer system or exceed authorized access (art. 29, para. 1 a)); and remaining or attempting
to remain fraudulently in part or all of a computer system (art. 29, para. 1 c)).
Article 3 (1) (a) of the Agreement on Cooperation among the States members of the Commonwealth of Independent States in
101
Combating Offences related to Computer Information calls for the criminalization of: the illegal accessing of computer information
protected by the law, where such act results in the destruction, blocking, modification or copying of information or in the disruption
of the functioning of the computer, the computer system or related networks (art. 3, para. (1) (a)); and Agreement the violation of
regulations governing the use of computers, computer systems or related networks by a person who has access to those computers,
systems or networks, resulting in the destruction, blocking or modification of computer information protected by the law, where
such act causes significant harm or serious consequences (art. 3, para. (1) (c)). The African Union Convention on Cyber Security and
Personal Data Protection considers the following to be a criminal offence: gaining or attempting to gain unauthorized access to part
or all of a computer system or exceed authorized access with intent to commit another offence or facilitate the commission of such an
offence (art. 29, para. 1 b)).
The African Union Convention requires States parties to criminalize intercepting or attempting to intercept computerized data
102
fraudulently by technical means during non-public transmission to, from or within a computer system (art. 29, para. 2 a)).
103
See also UNODC Teaching Modules, Cybercrime, Module 2: general types of cybercrime, “Computer-related offences”.
Available at sherloc.unodc.org/cld/en/education/tertiary/cybercrime/module-2/index.html
38
chapter V. Types of cyber organized crime
made to the data. The defendants were charged with unauthorized use and interception of com-
puter services under sections 15(1) and 20 of the Computer Misuse Act; electronic fraud in violation
of section 19 of the Computer Misuse Act; unauthorized access to data under sections 12(2) and 20
of the Computer Misuse Act; producing, selling or procuring, designing and being in possession of
devices, computers, computer programs designed to overcome security measures for protection of
data in violation of sections 12(3) and 20 of the Computer Misuse Act; unauthorized access to a
customs computerized system under section 191(1)(a) of the East African Community Customs
Management Act 2009; and fraudulent evasion of payment of duty in violation of section 203(e) of
the East African Community Customs Management Act 2009. Two of the four defendants were
found guilty of all charges except fraudulent evasion of payment of duty. Those two defendants were
sentenced to 12 years’ imprisonment for electronic fraud and 8 years’ imprisonment for unauthor-
ized use and interception of computer services, unauthorized access to data and producing, selling
or procuring, designing and being in possession of devices, computers, computer programs
designed to overcome security measures for protection of data; and they were ordered to pay a fine
of US$ 4,500 for unauthorized access to a customs computerized system.
For more information about this case, see UNODC, SHERLOC case law database, Case No. UGAx005.a
a
Available at https://sherloc.unodc.org/.
104
Ibid.
105
States parties are required to criminalize hindering, distorting or attempting to hinder or distort the functioning of a computer
system (art. 29, para. 1 d)).
106
States parties are required to criminalize entering or attempting to enter data fraudulently in a computer system (art. 29,
para. 1 e)).
107
States parties are required to criminalize damaging or attempting to damage, delete or attempting to delete, deteriorate or
attempting to deteriorate, alter or attempting to change the computer data fraudulently (art. 29, para. 1 f)).
108
States parties are required to criminalize intentionally inputting, altering, deleting or suppressing computer data, resulting in
inauthentic data with the intent that it be considered or acted upon for legal purposes as if it were authentic, regardless of whether or
not the data are directly readable and intelligible (art. 29, para. 2 b)).
109
States parties are required to criminalize the fraudulently procuring, for oneself or for another person, any benefit by inputting,
altering, deleting or suppressing computerized data or any other form of interference with the functioning of a computer system
(art. 29, para. 2 d)).
39
DIGEST OF CASES
In 2013, A.T. and Dr. C. (the managing director and a shareholder of the firm Ca. GmbH, which had put
up slot machines of the firm L. GmbH in their casinos in Germany) decided to manipulate the software
of the slot machines for financial gain. P., who knew of the plans, developed cards and dongles
(a device similar to USB stick) with which the software of the machines was manipulated to credit the
player points (tradable for cash) without previously having initiated a game. This was referred to as
the “credit approach”. P. also installed a backdoor in the software that was activated by daily codes
and manipulated the game in such a way that, instead of the player choosing between red and black
without having any indication of the result, the same colour appeared multiple times in a row. This
allowed the player to eliminate the usual risk of loss and receive points that could subsequently be
traded for money.
The original flash cards used by the slot machines were replaced by cards with the manipulated soft-
ware developed by P. This swap happened at night, outside of the casinos’ business hours. At first, the
backdoor was installed on the flash cards with the original software. Later, the backdoor, as well as
the manipulated software to perform the credit approach, were installed on a dongle that was inserted
into the slot machines.
The credit approach was used 200 times between July 2014 and January 2015 to obtain €4,485,965 in
winnings from the slot machines. Between March 2014 and January 2015, the backdoor was used by
43 people instructed by A.T., resulting in proceeds of €214,030. The people later instructed by
S.T. obtained a total of €1,218,420 from making use of the backdoor 1,770 times. In one instance,
S.T. himself played and retrieved €1,500 by using the backdoor.
The defendant was charged with and convicted of commercially based computer fraud under section
263a of the German Criminal Code, which provides that whoever, with the intention of obtaining an
unlawful pecuniary benefit for themselves or a third party, damages the property of another by influ-
encing the result of a data processing operation by incorrectly configuring the computer program,
using incorrect or incomplete data, making unauthorized use of data or taking other unauthorized
influence on the processing operation incurs a penalty of imprisonment for a term not exceeding five
years or a fine. He was also charged with the disclosure of trade secrets. The defendant was sen-
tenced to five years and six months of imprisonment.
For more information on this case, see UNODC, SHERLOC case law database, Case No. DEUx027.a
a
Available at https://sherloc.unodc.org/.
Data compromises (or data breaches), which occur when criminals illegally access data or databases,110 are
an example of data interference. This illicit access may be obtained in variety of ways, such as by using
malware (see chap. V, sect. A.4, below) and other tools to exploit system vulnerabilities, as well as social
engineering tactics designed to dupe unsuspecting individuals into engaging in acts that the criminals want
the targets to engage in (e.g. revealing personal information or clicking on a link infected with malware).
Social engineering tactics are used to perpetrate not only cyber-dependent crimes, but also cyber-enabled
crimes (for examples of these tactics, see chap. V, sect. B.1, subsect. (a), below).
40
chapter V. Types of cyber organized crime
Legal definitions of system interference, like those of data interference, vary. The African Union Convention
simply defines it as hindering, distorting or attempting to hinder or distort the functioning of a computer
system.111 The definition provided in the Council of Europe Convention explains what specific actions
constitute interference: inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing
computer data.112
The group included five named individuals: two defendants (L.D.F.J. and S.J.C.S.) and three associ-
ates (J.C.C.S., R.J.M.P. and L.A.D.S.C.). Other unnamed individuals were also involved in the cyber-
crime. The group divided the roles among its members. Some members were involved in gaining
physical access to ATMs and in the collection of the money, while others engaged in surveillance or
other tasks essential to the completion of the cybercrime. They obtained a total of 871,900 Argentine
pesos from targeted ATMs of a bank in the Province of Córdoba
The defendants were charged with and convicted of criminal association and co-authoring and partic-
ipating in fraud by computer manipulation L.D.F.J. received a sentence of three years and three
months of imprisonment. S.J.C.S. received a sentence of four years and three months of imprison-
ment. The court unified this sanction with another sentence and ordered a single sentence of
six years’ imprisonment. The Government seized the technological devices (cell phones, laptops,
SIM cards etc.) used in the commission of the cybercrime.
For more information about this case, see UNODC, SHERLOC case law database, Case No. ARGx017.a
a
Available at https://sherloc.unodc.org/.
According to article 5 of the Convention on Cybercrime, system interference is considered illegal when it is committed inten-
112
tionally and seriously hinders without right the functioning of a computer system by inputting, transmitting, damaging, deleting,
deteriorating, altering or suppressing computer data.
41
DIGEST OF CASES
Five individuals were accused of violating articles 265 and 266 of the Penal Code and articles 7, 8,
20 and 26 of law 53-09 on high-tech offences against the national telephone company. Three of the
defendants, SAGR, IDHP and WSH, were convicted of electronic fraud and sentenced to three years
of prison. Their sentences were suspended on the condition of keeping a permanent residence,
refraining from carrying any type of weapons and refraining from drinking alcoholic beverages.
For more information about this case, see UNODC, SHERLOC case law database, Case No. DOMx010.a
a
Available at https://sherloc.unodc.org/.
Examples of cybercrimes that interfere with systems are denial-of-service attacks and distributed
denial-of-service attacks. A denial-of-service attack overwhelms the target’s resources, resulting in the
denial of requests for access from legitimate users.113 This type of cybercrime targets the availability of the
systems and data. A distributed denial-of-service attack, like a denial-of-service attack, seeks to overwhelm
the target’s resources to prevent legitimate access to the target; however, instead of just one computer or
other technology, multiple computers and other technologies are used to overwhelm the target’s resources.
Distributed denial-of-service attacks can be committed when multiple users utilize their devices to commit
coordinated cyberattacks and/or when multiple computers and other technologies infected with malware
are leveraged to conduct a cyberattack.114 The network of digital devices infected with malware that can be
used in a distributed denial-of-service attack constitute what is known as a botnet. The malware used to
create a botnet enables the monitoring and remote control of the infected digital devices. Data may also be
stolen from these infected devices.
113
Marie-Helen Maras, Computer Forensics: Cybercriminals, Laws and Evidence, 2nd ed. (Burlington, Massachusetts, Jones and
Bartlett, 2015), p. 7.
114
Ibid., p. 8.
42
chapter V. Types of cyber organized crime
The members of the group mainly communicated using private and public Internet Relay Chat
channels. Participation in private channels was limited to the organizers of the cyberattacks. In
these channels, the organizers chose the targets, organized and coordinated the operations and
prepared public messages claiming responsibility for the attacks. The public channels did not have
access restrictions and were used as platforms for discussing topics related to the ideology of
Anonymous and for looking for participants for the distributed denial-of-service attacks launched
by the organizers of the private channels. Members of the private channels were charged with par-
ticipation in a criminal association under article 416 of the Italian Criminal Code (“Associazione per
delinquere”).
The cyberattacks perpetrated by the group consisted of distributed denial-of-service attacks and
illegal access to computer systems and data, which sometimes led to the defacement of victims’
websites. The modus operandi of these attacks followed a recurrent pattern. First, the members of
the criminal group decided on the target of the so-called operation. The targets were chosen on the
basis of maximizing prospective media exposure and dissemination of the group’s messages.
Secondly, when the members of the criminal group conducted distributed denial-of-service attacks,
they recruited participants in public Internet Relay Chat channels and made use of botnets. When
they sought illegal access to computer systems and data, they scanned the targeted website in
order to find flaws in its security system that they could exploit. Thirdly, the members of the group
usually gathered in private Internet Relay Chat channels in order to coordinate the cyberattacks and
support each other during the operations. Lastly, once an operation had been completed, the group
published a message in which they claimed responsibility for the cyberattacks on the blog and the
social network accounts related to Anonymous Italia.
The defendant appealed the decision of the Tribunal of Rome. The appeal was based on four
grounds, one of which was an error in the application of the criminal association offence (art. 416).
The Court of Cassazione rejected the appeal. Regarding the criminal association offence, the judges
found that the law had been applied correctly. Regarding the mens rea and the stable association
bond elements of the criminal association offence, the messages published on the blog and social
media profiles of Anonymous Italia in which members of the group claimed responsibility for the
cyberattacks showed the existence of a shared goal, the commission of crimes, and shared identity
among the members. Moreover, the continuous cooperation of the members of the criminal asso-
ciation in the commission of the cyberattacks between 2011 and 2012 showed the existence of a
stable association bond between them. The organization element of the criminal association
offence, which requires the existence of a minimum degree of organization between the criminals,
was fulfilled by the division of labour among the members. Regarding the organization element, the
Court took into consideration the structure of Anonymous, a fluid and flexible network of individuals
who share beliefs, without formal leadership. Despite the absence of formal leadership, some indi-
viduals in the network take the initiative organizing online operations and become informal leaders.
The Court stressed that the entire Anonymous community did not constitute a criminal association;
only the small groups of individuals, who planned and executed cyberattacks and, in that way,
assumed a leading role in the hacktivist community, could be considered a criminal association
under article 416.
43
DIGEST OF CASES
Cassazione penale, sezione feriale, sentenza No. 50620, 12 Settembre 2013 (Italy) (continued)
Moreover, the basic structure of private Internet Relay Chat channels defined the extension of the
criminal association: only those who had access to the private Internet Relay Chat channels could
be part of the criminal association. In this sense, the communication tool corresponded to the
structure of the criminal association. These remarks about the structure of Anonymous highlight
an important feature of the application of the criminal association to online criminal groups.
Prosecutors only charged the members of the private Internet Relay Chat channels in which cyber-
attacks were prepared and coordinated with the criminal association offence contrary to article 416.
They did not charge the users who visited the public Internet Relay Chat channels. The character-
istic of the private channels is that their access is limited to certain members, a feature that is also
common with online communities of paedophiles. Such communities often adopt control mecha-
nisms to select new members. As noted by the Court, Italian case law had applied the offence of
criminal association to online communities of paedophiles in the past. The decision of the Court
suggests that the application of the criminal association offence to online criminal groups is limited
to the ones that constitute a closed online community. This requirement may be seen as the result
of the fluidity of the online groups and the interactions that take place on the Internet and the risk
of overcriminalization of cyberspace through a broad application of the requirements of the crimi-
nal association offence. In an online environment where lines and borders of participation are
blurred, it is sometimes difficult to identify who is actually part of an organized criminal group.
This decision represents one of the Italian landmark cases on the application of the criminal asso-
ciation (art. 416 of the Italian Criminal Code) to organized criminal groups operating online. After
examining judicial decisions applying article 416 to online communities of paedophiles, the Court
set out the requirements for the application of the criminal association to online criminal groups.
The elements of the criminal association are: (a) the existence of an association bond between at
least three persons that shall not be short term or casual; (b) the existence of a criminal plan that
constitutes the aim of the organization; and (c) the existence of an organizational structure, with a
minimum degree of sophistication, that allows the criminal plan to be carried out.
Perpetrators of distributed denial-of-service attacks use existing tools to conduct such attacks, combine
existing tools, customize existing tools and create new tools. The creation of new tools and use of existing
tools were identified in the Europol report Internet Organised Crime Threat Assessment 2020 as methods
used by criminals to adapt to security measures.115 The tools used to conduct distributed denial-of-service
attacks and even botnets are available for sale or rent online and offered as a part of “crime as a service”.116
These tools can be custom-ordered or existing tools modified to users’ preferences. Access to these botnets,
as well as other systems and data of targets, are also offered online by criminal groups as a service for a fee
(sometimes called “access as a service”).117 A case in point are websites offering booter services, which are
utilized by paying users to launch distributed denial-of-service attacks. In United States v Sergiy Usatyuk,118
the defendant, the owner and administrator of sites offering booter services, pled guilty to conspiracy to
cause computer damage and was sentenced to 13 months’ imprisonment for his crime. The booter services
provided by him and his co-conspirators were used to conduct 1,367,610 distributed denial-of-service
attacks against systems inside and outside of the United States.119
115
Europol, Internet Organised Crime Threat Assessment 2020, p. 32.
116
Ibid.; Ken Dunham, and Jim Melnick, Malicious Bots: An Inside Look into the Cyber-criminal Underground of the Internet
(Boca Raton, Florida, CRC Press, 2009), pp. 3 and 57.
117
Europol, Internet Organised Crime Threat Assessment 2020, p. 31.
118
United States, Department of Justice, Office of Public Affairs, “Former operator of illegal booter services pleads guilty to con-
spiracy to commit computer damage and abuse”, press release, 27 February 2019; United States Attorney’s Office, Eastern District of
North Carolina, “United-States-v_Sergiy-Usatyuk”. Available at www.justice.gov/usao-ednc/united-states-v-sergiy-usatyuk.
119
United States District Court, Eastern District of North Carolina, United States v. Sergiy Petrovich Usatyuk, Case No.
5:18-CR-00461-BO, Criminal Information, 15 November 2018, p. 5.
44
chapter V. Types of cyber organized crime
The 2020 Europol report also revealed that Internet of Things120 devices are vulnerable to distributed
denial-of-service attacks.121 The Mirai botnet brought home the lesson that everyday objects connected to
the Internet can be successfully targeted by perpetrators. Specifically, the Mirai botnet, which at some point
was composed of hundreds of thousands of infected Internet of Things devices primarily based in the
United States, was used to conduct distributed denial-of-service attacks on various targets and provide rev-
enue to those who controlled the botnet.122 The revenue they obtained was retrieved from renting the botnet
to customers for a fee and extorting from hosting companies and others protection money to avoid being
targeted by denial-of-service attacks.123
4. Misuse of devices
The misuse of devices is considered illegal “when committed intentionally and without right”.124 This
cybercrime involves the possession, “production, sale, procurement for use, import, distribution or other-
wise making available of” a device, including a computer program, designed or adapted primarily for the
purpose of committing illegal access, illegal interception, data interference and/or system interference.125
An example of such a device is malware. Malware is often distributed through attachments and infected
links in emails and websites.126 However, criminals have also exploited software vulnerabilities to spread
malware and infect systems. While the majority of laws criminalize the misuse of such devices, other laws
explicitly prohibit the creation, use or distribution of malware.127
Criminals have additionally encrypted malware and taken other measures to evade detection by security
measures and law enforcement authorities. For instance, the malware created by the Bayrob criminal enter-
prise would block targets’ access to sites associated with law enforcement.128 Criminals have further offered
malware that is made-to-order, or customized according to the buyer’s preferences. SpyEye is an example
of a customizable malware toolkit that enabled the theft of personal and financial data. Buyers of this toolkit
could, for example, customize SpyEye to target and collect specific information from infected systems
or specific financial institutions and choose what methods would be used to collect this information
(e.g., keylogger).129
The Internet of Things is an umbrella term used to describe a network of Internet-connected devices that collect, store, collate,
120
analyse and share a significant amount of information and monitor people, animals, plants and/or objects in order to provide users
of these devices with some form of service (Marie-Helen Maras, “Internet of Things”, in Encyclopedia of Security and Emergency
Management, Lauren R. Shapiro and Marie-Helen Maras, eds. (Cham, Switzerland, Springer International Publishing, 2020)).
121
Europol, Internet Organised Crime Threat Assessment 2020, p. 33; for information about security concerns related to Internet
of Things devices, see Marie-Helen Maras, “Internet of Things: security and privacy implications”, International Data Privacy Law,
vol. 5, No. 2 (May 2015), pp. 99–104.
122
United States, Department of Justice, Office of Public Affairs, “Justice Department announces charges and guilty pleas in three
computer crime cases involving significant DDoS attacks”, press release, 13 December 2017.
123
United States District Court, District of Alaska, United States of America v. Paras Jha, Case No. 3:17-CR-00164, Plea
Agreement, 5 December 2017, p. 4.
Article 6, paragraph 1 a, of the Council of Europe Convention on Cybercrime.
124
125
Ibid. A somewhat similar definition is provided in article 29, paragraph 1 h), of the African Union Convention, in which States
parties are required to criminalize unlawfully producing, selling, importing, possessing, disseminating, offering, ceding or making
available computer equipment, programs or any device or data designed or specially adapted to commit offences.
126
Lorine A. Hughes and Gregory J. DeLone, “Viruses, worms, and trojan horses: serious crimes, nuisance, or both?”, Social
Science Computer Review, vol. 25, No. 1 (February 2007), p. 84.
127
See, for example, article 3, paragraph 1 (b), of the Agreement on Cooperation among the States members of the Commonwealth
of Independent States in Combating Offences related to Computer Information. According to the Cybercrimes (Prohibition, Prevention,
etc.) Act, 2015, of Nigeria, sect. 32, subsect. (3): any person who engages in malicious or deliberate spread of viruses or any malware
thereby causing damage to critical information in a public, private or financial institution’s computers shall be guilty of an offence and
is liable upon conviction to three years’ imprisonment or a fine of 1 million naira or both.
128
United States of America v. Bogdan Nicolescu, Tiberiu Danet and Radu Miclaus, p. 6. The Federal Bureau of Investigation
(FBI) of the United States mentioned that one of these sites was the Internet Crime Complaint Center (www.ic3.gov/) (for further
information, see United States, Federal Bureau of Investigation, “Romanian hackers sentenced: members of Bayrob criminal enter-
prise infected thousands of computers with malware, stole millions of dollars”, 20 February 2020).
129
United States, Northern District of Georgia, United States of America v. Aleksandr Andreevich Panin and Hamza Bendelladj,
Case No. 1:11-CR-0557-AT-AJB, First Superseding Indictment, 26 June 2013; United States, Department of Justice, Attorney’s
Office, Northern District of Georgia, “Two major international hackers who developed the ‘SpyEye’ malware get over 24 years com-
bined in federal prison”, 20 April 2016.
45
DIGEST OF CASES
The misuse of devices may also involve the possession or use of “a computer password, access code or
similar data by which the whole or any part of a computer system is capable of being accessed, with intent
that it be used for the purpose of committing” illegal access, illegal interference, data interference and/or
system interference.130 An example of this type of misuse of devices involved the deployment, by a cyber
organized criminal group, of malware known as GozNym, a Trojan Horse created by combining two others
(Gozi and Nymaim) and designed to infect targeted computers and capture financial data (particularly bank-
ing login credentials). The financial data were later used by members to commit bank fraud by gaining
unauthorized access to the targets’ accounts and stealing funds from those accounts.131
Most of the suspects were charged with and sentenced for their crimes. V.T. pleaded guilty to con-
spiracy to commit wire fraud and conspiracy to commit computer intrusion and was sentenced to
seven years and three months of imprisonment, with one year of supervision after release, and was
required to forfeit US$ 2.5 million.c Other conspirators also pleaded guilty and were sentenced for
their crimes (T.M. and V.A. were each sentenced to four years’ imprisonment; D.J. was sentenced to
three years and eight months of imprisonment; K.P. was sentenced to three years and four months
of imprisonment; and A.I. was sentenced to time served). One defendant, A.T., is currently still
at large.
For more information on this case, see UNODC, SHERLOC case law database, Case No. USAx207.d
a
United States District Court, Southern District of New York, United States of America v. Vladimir Tsastsin, Andrey Taame,
Timur Gerassimenko, Dmitri Jegorov, Valeri Aleksejev, Konstantin Poltev, and Anton Ivanov, Case No. S2-11-CR-878, Indictment,
1 November 2011.
b
United States Attorney’s Office, Southern District of New York, “Estonian cybercriminal sentenced for infecting 4 million
computers in 100 countries with malware in multimillion-dollar fraud scheme”, 26 April 2016.
c
Ibid.
d
Available at https://sherloc.unodc.org/.
Article 6 of the Council of Europe Convention on Cybercrime. A similar definition is provided in the African Union Convention
130
(art. 29, para. 1 h)): States parties to the Convention are required to criminalize unlawfully generating or producing a password, an
access code or similar computerized data allowing access to part or all of a computer system.
131
United States of America v. Alexander Konovolov et al. (GozNym malware); United States Attorney’s Office, Western District
of Pennsylvania, “Three members of GozNym cybercrime network sentenced in parallel multi-national prosecutions in Pittsburgh and
Tbilisi, Georgia”, 20 December 2019.
46
chapter V. Types of cyber organized crime
B. Cyber-enabled crime
Cyber-enabled crimes include traditional crimes where ICT plays a key role in the methods used to commit
the crimes and facilitates the crimes. The types of cyber-enabled crime explored in the subsections below
include: computer-related fraud or forgery (bank fraud; phishing; advanced fee fraud scam; romance scam;
and other fraud-related scams); computer-related identity offences; falsified medical product-related crime;
counterfeiting; blackmail; extortion and ransom (e.g. sexual extortion (sextortion), ransom scams and ran-
somware); child sexual abuse and exploitation offences (e.g. child sexual abuse and exploitation material;
child grooming; and live-streaming child sexual abuse); trafficking in persons; smuggling of migrants;
drug trafficking; trafficking in firearms; trafficking in wildlife; trafficking in cultural property; money-
laundering; and Internet gambling.
1. Computer-related fraud
There are two general categories of cybercrime that are explored in this section: computer-related forgery
and computer-related fraud. The first category, computer-related forgery, can be described as an act,
committed intentionally and without right, involving the input, alteration, deletion or suppression of
computer data, resulting in inauthentic data with the intent that it be considered or acted upon for legal
purposes as if it were authentic, regardless of whether or not the data are directly readable and intelligi-
ble.132 This category of cybercrime includes the impersonation of legitimate individuals and/or entities
for fraudulent purposes. Here, fraud can be regarded as the misrepresentation of a fact in order to per-
suade an individual, group, organization or other entity to provide the offender with something desired
or valued.
The second category of cybercrime, computer-related fraud, refers to an act, committed intentionally and
without right, causing loss of property to another person by any input, alteration, deletion or suppression
of computer data, and/or any interference with the functioning of a computer system, with fraudulent or
dishonest intent of procuring, without right, an economic benefit for oneself or for another person.133
A well-known example of this type of fraud is SIM box fraud. SIM boxes are used to bypass international
calls and terminate them as local calls and thereby deprive the authorities of tariffs chargeable on
international calls.134 In one case in Ghana, the SIM box fraud perpetrated by the defendants not only
deprived the Government of significant sums of money, but also caused the communication service pro-
vider to suffer a loss of about 2.9 million Ghanaian cedis, the equivalent of US$ 1,235,000 at the time of
the offence.135
Article 7 of the Council of Europe Convention on Cybercrime; see also article 10 of the Arab Convention on Combating
132
Information Technology Offences, in which forgery is considered a cybercrime when ICT is used as a means to alter the truth of data
in a manner that causes harm, with the intent of using the altered data as true data.
Article 8 of the Council of Europe Convention on Cybercrime. See also article 11 of the Arab Convention on Combating
133
Information Technology Offences, which refers to intentionally and unlawfully causing harm to beneficiaries and users with the
aim of committing fraud to illicitly realize interests and benefits to the perpetrator or a third party, through: (a) entering, modifying,
obliterating or concealing information and data; (b) interfering with the functioning of the operating systems and communication
systems or attempting to disrupt or change them; and (c) disrupting electronic instruments, programmes and sites.
134
Republic v. Michael Asamoah & Anthony Ogunsanwo Olawole (2019), p. 19.
135
Ibid. In this case, one of the defendants (MA) was sentenced for conspiracy to provide electronic communication service with-
out a licence, contrary to section 73 (1) of the Electronic Communication Act of 2008; providing electronic communication service
without authority, in violation of sections 3 (1) and 73 (1) (c) of that Act; and knowingly obstructing and interfering with the sending,
transmission, delivery and reception of communication, in violation of section 73 (1) (e) of that Act.
47
DIGEST OF CASES
Uganda v. Ssentongo & 4 Ors (Criminal Session Case 123 of 2012) [2017]
UGHCACD 1 (14 February 2017)
In Uganda, five former employees of the country’s largest telecommunication company allegedly
swindled money amounting to 10 billion Ugandan shillings out of the company. Using the company’s
former mobile money computer system, the defendants purportedly created billions of Ugandan
shillings and wired the money to their mobile money accounts, which they had created before
resigning from their jobs. The breached computer system, named after the South African company
that had created it, is still in the towers of the telecommunication company, though it has been
deactivated and replaced.
An audit revealed that the usernames of the defendants appeared on the fraudulent transactions
used to steal money from the mobile money computer system. Four of the defendants left the com-
pany in close succession between October and December 2011. This raised suspicion that they
could have committed a crime before leaving. Evidence also showed that the defendant P.S. abused
the trust bestowed on him by manipulating the system to steal money from the company’s mobile
platform, together with co-conspirators (including J.N., who withdrew funds). Witness P.L., the
former head of the network and information system department of the company, proved that, with
false entries, company administrators were able to create fictional e-money on the company’s
adjustment discrepancy account and withdraw it through the company’s public access shop (an
online platform open to the public to buy company shares).
Of the five defendants, three were acquitted of all charges. P.S. was charged and found guilty of
embezzlement under section 19(b)(i) of the Anti-Corruption Act of 2009, electronic fraud in violation
of section 19 of the Computer Misuse Act of 2011 and conspiracy to defraud under section 309 of the
Penal Code Act. J.N. was charged and found guilty of embezzlement under section 19(b)(i) of the
Anti-Corruption Act and conspiracy to defraud under section 309 of the Penal Code Act.
For more information about this case, see UNODC, SHERLOC case law database, Case No. UGAx008.a
a
Available at https://sherloc.unodc.org/.
Computer-related fraud can also involve the use of false or misleading information to obtain something
from the target that is considered desired and/or of value to the perpetrator.
48
chapter V. Types of cyber organized crime
The two defendants, along with J.P.R.E. and others, continued their illicit partnership, committing
another fraud, this time targeting another savings and loan association. The defendants used tech-
nology to steal the banking information of a female client of the association and illegally used that
information to access the online platform of the savings and loan association. They made 11 elec-
tronic fund transfers totalling 1,896,370 Dominican pesos, which they sent to accounts owned by
the defendants. The client reported these transactions to the savings and loan association.
The court found the defendants guilty of electronic transfer of funds and fraud, violating articles 14
and 15 of Law 53-07 on High Technology Crimes and Crimes, and criminal association, in violation
of articles 265 and 266 of the Dominican Penal Code. They were each sentenced to three years’
imprisonment for their crimes.
For more information about this case, see UNODC, SHERLOC case law database, Case No. DOMx001.a
a
Available at https://sherloc.unodc.org/.
There are many cybercrimes that can be considered computer-related forgery or fraud. Some of these cyber-
crimes, particularly bank and payment fraud, phishing, advanced fee fraud scams, romance scams and other
fraud-related scams, are explored in the subsections below.
On 25 January 2013, a sum of U Sh 3,150 million was transferred from the dispute account of the
company in seven equal instalments of U Sh 450 million each, to the company’s agent lines by
fraudulent means. According to a witness at the trial, the mobile money computer system of the
company had an external environment that involved banking, agents and subscribers, as well as
an internal system that was used specifically for mobile money. Within the internal system, there
were two accounts: a bank control account and a dispute account. After a deposit was made by an
agent in an account in the Ugandan bank, the deposit would be electronically synchronized into
the internal system through the dispute account and sent onward to the intended beneficiary
without manual intervention. What went in and out of the internal system was influenced by vir-
tual cash flows.
49
DIGEST OF CASES
Uganda v Sserunkuma & 8 Ors (HCT-00-CR-SC 15 of 2013) [2015] UGHCACD 4 (27 April 2015)
(Uganda) (continued)
In this case, the money, which went into agent lines, was later transferred to a total of 138 subscriber
accounts and withdrawn in cash or tokens. This was detected immediately. Subsequently, the system
was shut down and the loss was investigated. Evidence found during the investigation suggested that
the transactions were carried out using a computer that belonged to the telecommunication com-
pany. The defendants were not arrested while committing the offences but after the prosecution had
found evidence, which the court pointed out to be circumstantial, linking them to the crime. The pros-
ecution presented electronic evidence, including a forensic report, as well as the results of various
police searches, which led to the confiscation of several million Ugandan shillings, all of which sug-
gested the involvement of the defendants in the fraud. The charges against the defendants included
embezzlement under section 19(b)(i) of the Anti-Corruption Act, theft in violation of sections 254(1)
and 261 of the Penal Code Act, conspiracy to commit a felony under section 390 of the Penal Code Act,
unauthorized access in violation of section 12(3) and 20(1) of the Computer Misuse Act and electronic
fraud in violation of section 19 of the Computer Misuse Act. Ultimately, five of the nine defendants
were found guilty and sentenced to nine years’ imprisonment.
For more information about this case, see UNODC, SHERLOC case law database, Case No. UGAx006.a
a
Available at https://sherloc.unodc.org/.
Skimming occurs when a device is installed at a card terminal to surreptitiously collect users’ credit, debit
or bank card data. A skimmer is a type of device that is designed to surreptitiously collect such information.
One type of skimmer is an ATM skimmer. This device, a card reader, is attached to the part of the machine
where individuals place their cards. When a user places their card in the machine, the information on the
magnetic strip is collected and stored. Personal identification numbers (PINs) are also collected by placing
cameras directed at the keypad.
Gachev & Ors v Uganda (Criminal Appeal 155 of 2013) [2016] UGHCCRD 4
(16 July 2016) (Uganda)
In a high-profile case in Uganda, four Bulgarian men were accused of forging ATM cards. The men
were eventually prosecuted and convicted,
The four defendants were arrested at an ATM location in Natete, Uganda, after closed-circuit tele-
vision cameras had been installed in ATMs following complaints about unauthorized withdrawals
being made from several customers’ accounts. The defendants had used an ATM skimmer to steal
card data, picked accounts with higher sums, forged ATM cards and withdrew the money from the
customers’ accounts. After converting the money into United States dollars, the defendants had
wired the money to bank accounts in Bulgaria. In one of the defendant’s cars, 37 cards and a list of
bank customers’ personal identification numbers (PINs) had been recovered.
The defendants were charged with unauthorized access to computer data contrary to section 12 of
the Computer Misuse Act and conspiracy to commit a felony contrary to sections 390, 342 and
347 of the Penal Code Act. Three of the defendants were ordered to serve a total of 20 years’ impris-
onment for the 33 counts of forgery. The fourth defendant was ordered to serve a total of 10 years’
imprisonment for the 33 counts. The judge of the High Court of Uganda also ordered that each of
them be deported to their country of origin after serving their respective sentences. All the defend-
ants appealed their convictions and sentences. The High Court allowed the appeal of the fourth
50
chapter V. Types of cyber organized crime
defendant, whose conviction was quashed and whose sentence was put aside. The appeals of the
remaining three defendants were dismissed and the convictions were upheld by the High Court.
However, each of their sentences were lessened to a jail term of nine years on the ground that they
were first-time offenders who deserved the court’s lenience.
For more information about this case, see UNODC, SHERLOC case law database, Case No. UGAx007.a
a
Available at https://sherloc.unodc.org/.
In one case in Germany, three individuals were accused of skimming magnetic strip data, as well as
obtaining the PINs of several cards, using card readers and miniature cameras.136 After surreptitiously
collecting the data, they created duplicates of the cards (i.e., they cloned the cards) and used them abroad
to make payments to other accounts. They were convicted of participating in falsifying guaranteed pay-
ment cards137 and computer fraud.138 In another case,139 the German court considered whether
ATM skimming could be considered a form of data espionage, defined in the German Criminal Code,
section 202a (1), as obtaining, for themselves or another, unauthorized access by circumventing the
access protection of data that were not intended for them and were specially protected against unauthor-
ized access. The court found that the reading of the information of the payment card saved on the mag-
netic strip did not fulfil this requirement, since the data on the magnetic strip were not encrypted or
otherwise protected. The fact that some data were saved and transferred magnetically, electronically or
otherwise not immediately perceptibly was not to be regarded as “access protection”. The court came to
the same conclusion regarding the acquisition of PINs, stating that only the unauthorized use of the data
when using the card was protected, not the illicit access to the card via a reading device. Accordingly, the
court held that neither the acquisition of PINs nor the reading of data stored on the magnetic strip of cards
to produce cloned cards was a form of data espionage.
136
UNODC, SHERLOC case law database, Germany, Case No. DEUx029, BGH, Beschluss vom 31.05.2012, 2 StR 74/12.
Available at https://sherloc.unodc.org/.
The German Criminal Code (Strafgesetzbuch), which covers counterfeiting of guaranteed payment cards and blank Eurocheques,
137
defines “guaranteed payment cards” as credit cards, Eurocheque cards and other cards which oblige the issuer to make a guaranteed
payment by money transfer and which are specially protected against imitation by dint of their design or coding (sect. 152b (4)).
138
Sect. 263a of the German Criminal Code (Computer fraud).
139
UNODC, SHERLOC case law database, Germany, Case No. DEUx026, BGH, Beschluss vom 06.07.2010, 4 StR 555/09.
Available at https://sherloc.unodc.org/.
51
DIGEST OF CASES
Public Prosecutor v. Law Aik Meng [2006] SGDC 243 (Singapore) (continued)
L.A.M.’s role in the syndicate was to install the skimming devices in ATMs in Singapore. Once data
were captured, he was responsible for removing the skimming devices and transmitting the captured
data to West Malaysia. L.A.M. was also responsible for using cloned cards to make fraudulent with-
drawals. With L.A.M.’s help, the syndicate successfully withdrew 18,590 Singapore dollars from the
post office savings bank. This activity took place over a period of three months in 2006. Some 849 post
office savings bank accounts were compromised and a multinational development bank had to block
and replace each account. The assistant vice-president of compliance services of the development
bank called the police on 24 May 2006 to inform them of skimming devices that had been located.
A police investigation ensued, and L.A.M. was subsequently arrested in connection with the case and
taken to the commercial affairs department for further investigation. For his crimes, L.A.M. received
a sentence of 12 years’ imprisonment. No other conspirators were apprehended.
L.A.M.’s case was the first case of its kind in Singapore involving a criminal enterprise perpetrating
ATM fraud.
For more information about this case, see UNODC, SHERLOC case law database, Case No. SGPx013.a
a
Available at https://sherloc.unodc.org/.
Card-not-present fraud involves the illicit possession, procurement, use and/or distribution of debit and
credit card data. Examples of card-not-present fraud include e-skimming, whereby malware is injected on
a site that captures payment data, and carding, which involves the use of stolen credit card or debit card data
to obtain goods and/or services. In R. v. Nicholas Webber,140 a young male (between 17 and 18 years old)
pleaded guilty to conspiracy to defraud for creating a website (www.ghostmarket.net) dedicated to carding,
where debit and credit data were made available for purchase. In another case, known as Unlimited
Operations, a transnational organized criminal group conducted an international fraud operation by hacking
into global financial institutions networks to illegally obtain data on debit cards.141 The group then cloned
the cards, removed the withdrawal limits, and then distributed the cards to cashers to go to ATMs at a
coordinated date and time to withdraw money. The withdrawals occurred in over 20 countries. The banks
targeted in this scheme were in Oman and the United Arab Emirates.142
In late 2019, the bank received information that an organized criminal group had relocated to
Rwanda in order to steal money from the bank using a method similar to the one used to steal
money from accounts in Kenya and Uganda. The bank informed the Rwanda Investigation Bureau,
which conducted an investigation and found that the group wanted to execute this scheme using the
bank customers’ ATM cards. To achieve their objective, the group approached a Rwandan citizen
outside of Rwanda who agreed to participate in the scheme. His number was given to one of the
140
England and Wales Court of Appeal, R. v. Nicholas Webber [2011] EWCA Crim 3135; R. v. Nicholas Webber [2012] 2 Cr. App.
R. (S.) 41 (2011).
141
United States of America v. Jael Mejia Collado et al.; United States of America v. Ercan Findikoglu; United States Attorney’s
Office, Eastern District of New York, “Leader of global cybercrime campaigns pleads guilty to computer intrusion and access device
fraud conspiracies”, 1 March 2016.
142
United States Attorney’s Office, Eastern District of New York, “Eight members of New York cell of cybercrime organization
indicted in $45 million cybercrime campaign”, 9 May 2013.
52
chapter V. Types of cyber organized crime
group members so that he would be informed about the details of the scheme after arriving in
Rwanda. The Rwanda Information Bureau followed up on every contact between them after the
Rwandan citizen arrived in his home country and met the other members of the group. The group
members started implementing their plan of stealing the bank’s money by using an identification
application. The defendants were finally arrested at the Remera branch of the bank after trying to
steal money from 23 bank accounts.
The 22 defendants were each charged with unauthorized access to a computer or computer system
data, access to data with intent to commit an offence, unauthorized modification of computer or
computer system data, theft and forming or joining a criminal association. They were eventually
convicted of all counts. They were each sentenced to eight years’ imprisonment and ordered to pay
compensation to the bank.
For more information about this case, see UNODC, SHERLOC case law database, Case No.
RWAx001.a
a
Available at https://sherloc.unodc.org/.
(b) Phishing
Criminals impersonate legitimate organizations in email messages in order to trick targets of the crime into
trusting the content of the communications and following instructions that are designed to induce a target:
to unknowingly reveal personal and/or financial information; and/or to access malicious links and/or down-
load malware onto the target’s systems to enable the criminals to gain unauthorized access to the target’s
system, network and/or data. When this tactic targets a variety of users (and not a specific target), this crime
is commonly known as phishing.143
While the term “phishing” may not be directly used in many international, regional and national laws, it is
considered a crime. In National Association of Software and Services Companies (NASSCOM) v. Ajay
Sood,144 the High Court of Delhi held that, even though phishing was not specifically criminalized in law, it
was an illegal act under law (i.e., an Internet fraud) because it involved a misrepresentation made in the
course of trade leading to confusion as to the source and origin of the email causing immense harm not only
to the consumer but even to the person whose name, identity or password was misused.
Phishing is a cyber-enabled crime and has been used to facilitate several forms of cyber-enabled crimes, and
even cyber-dependent crimes (see the box below). Phishing schemes can be perpetrated by actors with or
without technical skills and abilities because the tools and know-how are readily available online (as part of
“crime as a service”).145 If the goal or one of goals of the phishing operation is to either take control of the
target’s system and/or steal information from the system, malware is used to infect the target’s device.146
For example, members of FIN7, an international cybercrime group, were charged with offences relating to
illicit acts against the confidentiality, integrity and availability of computer data and systems. The members
of the group used “spear phishing” (sending emails or other electronic forms of communication to a specific
individual, organization or business in order to steal data for malicious purposes or to install malware on the
target’s computer system) and social engineering tactics to trick targets into opening a malicious email with
143
See also UNODC Teaching Modules, Cybercrime, Module 2: general types of cybercrime, “Computer-related offences”.
Available at sherloc.unodc.org/cld/en/education/tertiary/cybercrime/module-2/index.html.
144
National Association of Software and Services Companies (NASSCOM) v. Ajay Sood & Others, 119 (2005) DLT 596, 2005 (30)
PTC 437 Del, Judgment, 23 March 2005.
145
Europol, Internet Organised Crime Threat Assessment 2020, p. 15 and 17.
146
See, for example, UNODC, SHERLOC case law database, Germany, Case No. DEUx032, LG Bonn, Urteil vom 07.07.2009,
7 KLs 01/09 (phishing Trojans used). Available at https://sherloc.unodc.org/; United States, District Court, Western District of
Washington at Seattle, United States of America v. Fedir Oleksiyovych Hladyr, Case No. CRl7-276RSL, Superseding Indictment,
25 January 2018; United States of America v. Fedir Oleksiyovych Hladyr, Case No. CR17-276RSM, Plea Agreement, 11 September
2019). (Carbanak malware); and United States of America v. Bogdan Nicolescu, Tiberiu Danet and Radu Miclaus (Bayrob Trojan).
53
DIGEST OF CASES
an attachment that contained malware (Carbanak malware) designed to steal customers’ financial data.147
Three FIN7 members (F.O.H., A.K. and D.I.) were extradited from Germany, Spain and Thailand, respec-
tively, to the United States. Two members of the group (A.K. and F.O.H.) pleaded guilty to conspiracy to
commit wire fraud and conspiracy to commit computer hacking and received sentences of 7 years and
10 years of imprisonment, respectively.148 [[TPU: pls renumber remaining footnotes in running text accord-
ingly]]The other defendant (D.I.) was sentenced to five years’ imprisonment.149 Another member of the
group (D.F.) was arrested in Poland; his extradition to the United States is still pending.
The defendant was charged with and convicted of committing fraud through the unauthorized use
of data and received a sentence of one year and six months of imprisonment. As the defendant had
previously been sentenced, the court ordered a single sentence of three years and nine months of
imprisonment, combining both sentences.
For more information about this case, see UNODC, SHERLOC case law database, Case No. ARGx016.a
a
Available at https://sherloc.unodc.org/.
147
United States of America, Fedir Oleksiyovych Hladyr, Case No. CRl7-276RSL, Superseding Indictment; United States of
America v. Fedir Oleksiyovych Hladyr, Case No. CR17-276RSM, Plea Agreement; see also court documents, United States Attorney’s
Office, Western District of Washington, United States of America v. Fedir Oleksiyovych Hladyr, United States of America v. Dmytro
Valerievich Fedorov, United States of America v. Andrii Kolpakov, United States of America v. Denys Iarmak.
148
United States District Court, Western District of Washington at Seattle, United States of America v. Andrii Kolpakov,
Case No. 18-CR-159RSM, Plea Agreement, 16 November 2020; United States of America v. Fedir Oleksiyovich Hladyr, Case No.
17-CR-276RSM, 11 September 2019; U.S. Department of Justice, Office of Public Affairs, Member of Hacking Group Sentenced for
Scheme that Compromised Tens of Millions of Debit and Credit Cards (April 7, 2022).
149
United States Attorney’s Office, Western District of Washington, United States of America v. Fedir Oleksiyovych Hladyr,
United States of America v. Dmytro Valerievich Fedorov, United States of America v. Andrii Kolpakov, United States of America v.
Denys Iarmak; United States Department of Justice, Office of Public Affairs, Member of Hacking Group Sentenced for Scheme that
Compromised Tens of Millions of Debit and Credit Cards (April 7, 2022).
54
chapter V. Types of cyber organized crime
The criminal group’s modus operandi consisted of the use of computer tools to deceive bank
account holders and steal their passwords and security codes. The criminal group obtained the
customer’s banking information from databases on the deep web and later sent them cloned
emails and fake links to web pages of their banks to obtain their passwords. By accessing the mali-
cious links, the customers were involuntarily delivering their passwords to the false banking plat-
form (i.e., on a fraudulent website). Members of the organized criminal group also impersonated
bank executives while making telephone calls to obtain security codes from customers or posed as
customer representatives to request a “coordinate card” to the bank (a security mechanism facili-
tated by the banks to approve transactions). “Chip spoofing” (or “SIM card hijacking”) was also
among the techniques used to obtain additional security keys. Once the coordinate card or the
security device were materially obtained, the criminals had access to the security keys of the cli-
ents. With all of this information, they were able to access the accounts without authorization and
transfer funds to previously recruited third parties. Participation in an organized criminal group
was established given the systematic way in which they repeatedly committed fraud.
This criminal group operated in an organized manner within a hierarchical structure and with spe-
cific roles for each member. The hierarchical structure of the group was as follows: the group had
two leaders (M.A.M. and D.Z.C.), who were in charge of organizing the illicit activity aimed at obtain-
ing money from bank accounts and obtaining security codes and access to online (or virtual)
accounts. This role implied general planning and distribution of tasks, which were followed by the
other members, who made their personal contributions to the common goal. The leaders were in
charge of granting and implementing the means of obtaining passwords (computer viruses, use of
databases on the deep web, etc.) to seize bank information and make successive fraudulent elec-
tronic transfers. The leaders issued direct instructions, received reports, managed the money
obtained and distributed the proceeds of the crime among the different members of the organiza-
tion. The defendant, M.A.M., served as administrator, an essential role in the survival of the organ-
ization and the continuity of criminal operations. Other members of the groups were responsible
for security and recruitment. These individuals were part of the permanent operational arms of the
organization, receiving direct instructions from the leaders. They were responsible for providing
security to the members of the organization, ensuring that the “recipients” actually delivered the
money to the organization. They directly supervised the transfer of money and the “recruiters of
recipients”. The role of the recruiters of recipients was to find account holders who, in exchange for
a commission, were willing to receive the money illegally obtained in their bank accounts. The
recipients provided the organization their bank accounts, obtained the transferred money and
delivered the licit funds to the recruiters and the leaders.
The defendant was sentenced to one year in prison for the crime of criminal association,a two years’
imprisonment for the crime of reiterated fraudb and two years’ imprisonment for money-laundering.c
For more information about this case, see UNODC, SHERLOC case law database, Case No. CHLx007.d
a
Article 293 in relation to article 467 of the Penal Code of Chile.
b
Article 467, final paragraph, of the Criminal Code in relation to article 351 of the Criminal Procedure Code.
c
Chile, Law No. 19,913 on the Establishment of the Financial Analysis Unit and Amendment of Several Provisions on
Money-Laundering (2003), art. 27.
d
Available at https://sherloc.unodc.org/.
When phishing is used against specific targets, it is known as spear phishing.150 The Bayrob group perpe-
trated this type of fraud by pretending to be legitimate organizations, such as a well-known company offer-
ing protection against computer viruses and a well-known money transfer service, and sending to targets
emails with infected attachments. When individuals who received the emails clicked on the attachment,
150
See also UNODC Teaching Modules, Cybercrime, Module 2: general types of cybercrime, “Computer-related offences”.
Available at sherloc.unodc.org/cld/en/education/tertiary/cybercrime/module-2/index.html.
55
DIGEST OF CASES
malware was installed on their computers. This malware would harvest data and make the infected comput-
ers part of a botnet.151 Data harvested from the infected systems (account access data, financial data and
passwords) were also sold on the darknet.152
When such emails are used to target companies that have suppliers abroad and conduct wire transfers
abroad, the tactic is known as business email compromise because the perpetrators pretend to be a known
company that the target conducts business with. The emails sent making the requests are often spoofed
emails (which are considered slight variations of the legitimate emails of known companies and personnel
within those companies) and/or hacked email accounts of actual company personnel. “Operation Wire
Wire”, led by authorities in the United States, revealed that a criminal group had been masquerading as a
legitimate entity that its targets (other companies) had worked with in some capacity in order to trick the
targets into wiring money to the criminal group and/or its associates.153 The proceeds of this fraud were
laundered with the help of “money mules”, who had opened various shell company bank accounts to laun-
der the proceeds of this crime.
For more information about this case, see UNODC, SHERLOC case law database, Case No. USAx213.e
a
United States District Court, Eastern District of Virginia, United States of America v. Obinwanne Okeke, Case No. 4:19-mj-
116-1, 2 August 2019.
b
Affidavit in support of criminal complaint and arrest warrant (Obinwanne Okeke), 2 August 2019.
c
Ibid.
d
The defendant pleaded guilty to conspiracy to commit wire fraud (United States Attorney’s Office, Eastern District of
Virginia, “Nigerian businessman pleads guilty to $11 million fraud scheme”, press release, 18 June 2020.
e
Available at https://sherloc.unodc.org/.
When higher-level executives in an organization are the targets of spear phishing, the tactic is referred to as
“whaling” because the perpetrators targeting those individuals are seeking the highest payout possible.
In the Europol report Internet Organised Crime Threat Assessment 2020, the term “CEO fraud” was used
instead of “whaling”.154
United States of America v. Bogdan Nicolescu, Tiberiu Danet, and Radu Miclaus, pp. 7–9.
151
Ibid.
152
153
United States District Court, District of Connecticut, United States of America v. Adeyemi Odufuye and Stanley Hugochukwu
Nwoke, Case No. 3:16R232 (JCH), Indictment, 20 December 2016 (Operation Wire case).
154
Europol, Internet Organised Crime Threat Assessment 2020, p. 47.
56
chapter V. Types of cyber organized crime
Phishing is more likely to be mentioned in court documents than terms such as spear phishing, business
email compromise scam, “CEO fraud” and “whaling”. The term “whaling” is not commonly found in court
documents because it could be considered as a form of business email compromise if the targets are
higher-level executives, such as the chief executive officer or the chief financial officer.
155
Maras, Cybercriminology.
156
UNODC, SHERLOC Case law database, Case No. NGAx001. Available at https://sherloc.unodc.org/.
157
UNODC, Nigeria, “West Africa takes lead in fighting 419 scams”. Available at www.unodc.org/; and Lily Hay Newman,
“Nigerian email scammers are more effective than ever”, Wired, 3 May 2018.
Monica T. Whitty and Tom Buchanan, “The online dating romance scam: the psychological impact on victims – both financial
158
and non-financial”, Criminology and Criminal Justice, vol. 16, No. 2 (April 2016), pp. 176–194; Tom Buchanan and Monica T. Whitty,
“The online dating romance scam: causes and consequences of victimhood”, Psychology, Crime & Law, vol. 20, No. 3 (March 2013),
pp. 261–283.
159
Maras, Cybercriminology, p. 244.
160
France, Tribunal de grande instance de La Roche-sur-Yon, 24 septembre 2007
161
Ibid.
57
DIGEST OF CASES
In December 2011, the complainant was first contacted on a dating website by a person who
introduced himself as “Steve Gauman”, a German living in Australia. He asked the complainant
to meet in Perth; however, just before the meeting, he told the complainant that he had to go
abroad to work. In January 2012, while the complainant was in Melbourne, “Gauman” (C.M.)
called the victim and affirmed that he was in Ghana, staying at a hotel near the port of Accra,
waiting for his shipping containers to arrive. He also told the complainant that his Australian
bank accounts had been frozen, that he only had bank cheques with him and that the hotel would
only accept cash. He pleaded to the complainant to help him financially. The complainant agreed
and made two money transfers, $A 2,000.00 and $169,597.82. Towards the end of January 2012,
“Gauman” introduced M.L. to the victim through a telephone conversation, presenting him as an
employee assigned to assist him in unloading his shipping containers and finalizing the consign-
ment with his customers. He also told the complainant that he had been detained in the United
Kingdom by customs authorities for carrying gold in his bags without authorized documentation.
During the period from January 2012 to March 2013, C.M. requested the complainant to send
money to M.L. M.L. received the sum of $A 211,346.53 through his bank account and international
money transfers. Between March 2013 and June 2014, the complainant sent $A 67,082.83 to S.G.
Between June 2014 and September 2014, the complainant was instructed to transfer more
money to S.G. to obtain court documents for the release of “Gauman” from detention in the
United Kingdom. The complainant said that she transferred all the funds to the defendant under
the false belief that “Steve Gauman” was a German citizen with an Australian residence and that
she was helping him to return to Perth, after which he would repay her. The defendants were
operating from Ghana and defrauding the complainant in Australia. Thus, the crime took place
across international borders and involved the receipt of funds via international bank transfers
and international money transfer companies. According to the prosecution, the remittances were
sent via international money transfers and bank transfers. There was documentary and elec-
tronic evidence of the funds sent, including emails, bank records and the records of wire
transfers.
M.L., C.M. and S.G. were charged and found guilty of: conspiracy to defraud in violation of sections
23(1) and 131(1) of the Criminal Offences Act of 1960 and section 123 of the Electronic Transactions
Act of 2008; defrauding by false pretences under section 131(1) of the Criminal Offences Act of 2006
and section 123 of the Electronic Transactions Act of 2008; and money-laundering in violation of
section 1(1) of the Anti-Money Laundering (Amendment) Act 2014. M.L. was sentenced to four
years’ imprisonment.
For more information about this case, see UNODC, SHERLOC case law database, Case No. GHAx001.a
a
Available at https://sherloc.unodc.org/.
58
chapter V. Types of cyber organized crime
The purpose of the romance scam is to lure a target into a relationship (albeit a fake one, unbeknown to the
target). A perpetrator can feign having a background and experiences similar to those of the target. This infor-
mation is often available online in the target’s dating profiles, social media accounts and on other sites that
include information about the target. The perpetrator uses a fake image, often an attractive image from a web-
site, platform or app obtained without authorization, that is resonant with his or her target. The type of profile
encountered depends on who the target is. For example, some perpetrators who target retirees create profiles
of individuals who are of a similar age, are in retirement and/or have recently been widowed. The fake profiles
created by perpetrators often include employment that would justify significant absences in communication
with the target and or the ability to travel. For instance, fake profiles on dating websites have been set up by
people pretending to be military personnel. In one romance scam, which targeted women over 50 years old on
online dating sites, the perpetrators pretended to be male members of the United States military.162 Perpetrators
create bank accounts in different names in order to receive money sent from their targets and/or to obtain
money orders from targets that are then dispersed to other conspirators in the perpetrators’ country.163
These scammers can manipulate targets into wittingly or unwittingly aiding and abetting crimes. Thus, their
targets may wittingly or unwittingly engage in money-laundering, deliver controlled drugs and/or other illegal
goods and scam other individuals out of money or goods.164 These individuals are known as “mules”. Mules
may be motivated by fear, love or the prospects of financial compensation to wittingly commit an illicit activ-
ity.165 Mules play a primary role in many crimes and cybercrimes, such as money-laundering and various
online frauds. Money mules may be wittingly recruited and/or solicited online in order to engage in mon-
ey-laundering for criminals by opening up a bank account and receiving money from others, which is then
forwarded to the criminals in various ways (through wire transfers, by purchasing prepaid cards and mailing
those cards, through online payment platforms, etc.). Other money mules may be duped into opening up bank
accounts to receive or transfer funds from a criminal masquerading as a romantic interest for what they believe
to be a legitimate purpose; or the money mules may be duped into utilizing their own bank account to receive
and transfer the funds from a criminal pretending to be a romantic interest (or legitimate employer).
For more information about this case, see UNODC, SHERLOC case law database, Case No. USA005R.d
a
United States of America v. Oladimeji Seun Ayelotan, Femi Alexander Mewase and Rasaq Aderoju Raheem, Case No. 17-60397.
b
Ibid.
c
United States, Department of Justice, Office of Public Affairs, “Three Nigerians sentenced in international cyber financial
fraud scheme”, press release, 25 May 2017.
d
Available at https://sherloc.unodc.org/.
162
United States Attorney’s Office, Eastern District of Kentucky, “Nigerian national pleads guilty in romance fraud and grant fraud
scheme”, press release, 24 August 2020.
163
Ibid.
164
Maras, Cybercriminology.
165
Better Business Bureau, “Fall in love: go to jail – BBB report on how some romance fraud victims become money mules”
(February 2019).
59
DIGEST OF CASES
United States of America v. Bogdan Nicolescu, Tiberiu Danet, and Radu Miclaus,
Case No. 1:16-CR-00224 (N.D. Ohio, 8 July 2016) (Bayrob Group) (United States
of America)
An organized criminal group perpetrated several cybercrimes, one of which was online auction fraud.
The fraud was perpetrated by members of the group by posting hundreds or thousands of listings for
automobiles, motorcycles and other high-priced goods on online auction sites.a The images of the
items being sold that were included in the postings were infected with their malware (the Bayrob
Trojan).b When individuals clicked on the images of the items, their devices were infected with the
malware, which had been designed to redirect the individuals to web pages that looked identical to the
legitimate web pages of the auction sites. For example, their fake web pages included the trademark
of a well-known online auction site and had a similar layout, design and style of the legitimate web
pages of that auction site. The fake web pages, however, prompted users to pay for the auctioned
items using something called an “eBay escrow agent”, which did not exist on the legitimate platform
of the auction site.c This purported service claimed to hold the money of the buyer in escrow until the
item was received and the buyer was satisfied with the condition of the item delivered before the
166
Maras, Computer Forensics, p. 149.
167
India, State of Maharashtra v. Opara Chilezien Joseph, Regular Criminal Case No. 724/2012, 28 October 2013.
168
For more information on online auction frauds, see Maras, Computer Forensics, pp. 113–115 and 143.
169
France, Cour de cassation, Chambre criminelle, No.11-84.437, 21 March 2012.
60
chapter V. Types of cyber organized crime
buyer’s funds were released to the seller. The web pages also included a live chat function that ena-
bled the unknowing users to speak with members of the group posing as customer service agents of
the online auction site.d The victims of this online auction fraud never received the items they had paid
for and never received a refund for the money they had paid for the non-delivered items.e
One of the defendants (T.D.) pleaded guilty to aggravated identity theft, wire fraud and conspiracy
offences relating to wire fraud and money-laundering and received a sentence of 10 years of impris-
onment for his crimes.f B.N. and R.M. were charged with, convicted and sentenced to 20 and 18 years
of imprisonment, respectively, for aggravated identity theft, wire fraud and conspiracy offences relat-
ing to wire fraud and money-laundering, as well as conspiracy to traffic in counterfeit service marks.g
For more information on this case, see UNODC, SHERLOC case law database, Case No. USAx170.h
a
United States of America v. Bogdan Nicolescu, Tiberiu Danet and Radu Miclaus, p. 8.
b
Ibid.
c
Ibid.
d
Ibid.
e
Ibid.
f
United States Attorney’s Office, Northern District of Ohio, “Multiple victim case update: United States v. Nicolescu et al.”,
16 January 2020; United States, Federal Bureau of Investigation, “Romanian hackers sentenced”.
g
Ibid.; and United States, Department of Justice, Office of Public Affairs, “Two Romanian cybercriminals convicted of all
21 counts relating to infecting over 400,000 victim computers with malware and stealing millions of dollars”, 11 April 2019.
h
Available at https://sherloc.unodc.org/.
Another example of an online scam is online sales fraud. This type of fraud involves the online purchasing
– from websites that may be designed to look similar to known and/or popular commercial websites – of
goods: that do not exist, that are never delivered, that are counterfeit but advertised as authentic or that are
damaged, of lower quality or otherwise not as advertised.170 In Germany, a defendant operated more than
20 online shops, mostly offering coffee machines or other kitchen items.171 The websites were modelled
after popular e-commerce websites, including the website of a well-known multinational online sales enter-
prise. Customers had to pay in advance and received an automated order confirmation. Payment agents then
transferred the money received to the defendant. The products were never sent to the customers. The fraud-
ulent operation took place mostly in Spain and, to a lesser extent, in the Netherlands. The defendant pleaded
guilty and received a sentence of five years and five months of imprisonment.
A further example of an online scam is a “subscription trap”, where websites offer for a fee services that are
offered free of charge on other websites; such services may include access to databases of publicly available
information, love and sex tests and the use of software that is available elsewhere at no cost (freeware).
A case in Germany revealed that a group included “subscription traps” on various websites.172 On the
group’s website, the registration pages were designed so that individuals signing up for the services on the
site would not notice that there was a fee associated with the use of the services. The information about the
cost associated with the use of the services was located at the bottom of the login page and was not visible
to users with average-sized monitors unless they scrolled down to the end of the page. Individuals could
complete their registration without needing to scroll down to the end of the page, where the cost was indi-
cated. Once the individuals registered on the page, they received an email confirming the contract and
ordering them to pay €60 or €84 (depending on the type of service they had signed up for). If they did not
pay, the lawyer of the group (one of the defendants) sent payment and collection notices to the individuals
who had registered for the service. The defendants were charged with and convicted of numerous crimes,
including fraud (see the discussion of copyright infringement in chapter V, section B.4, below).173
170
For more information, see Maras, Computer Forensics, p. 115.
171
UNODC, SHERLOC case law database, Case No. DEUx030, LG München, Urteil vom 07.06.2017, 19 KLs 30 Js 18/15.
Available at https://sherloc.unodc.org/.
172
UNODC, SHERLOC case law database, Case No. DEUx031, LG Hamburg, Urteil vom 21.03.2012, 608 KLs 8/11. Available
at https://sherloc.unodc.org/.
173
Section 263 (Fraud) of the German Criminal Code (Strafgesetzbuch). For further information about these crimes, see UNODC,
SHERLOC case law database, Case No. DEUx031.
61
DIGEST OF CASES
a
Art. 172 of the Penal Code of Argentina.
b
Arts. 12, 40, 41, 50 and 58 of the Penal Code and arts. 550–551 of the Penal Procedure Code of Argentina.
c
Arts. 45 and 210 of the Penal Code.
d
Arts. 45, 55 and 173 (15) of the Penal Code.
e
Available at https://sherloc.unodc.org/.
See also UNODC Educational Modules, Cybercrime, Module 2: general types of cybercrime, “Computer-related offences”.
174
62
chapter V. Types of cyber organized crime
Four of the defendants (G.E., R.H., C.J. and R.G.A.) pleaded guilty to conspiracy to commit wire
fraud and were sentenced for their crimes:
(a) G.E. was sentenced to 10 months’ imprisonment and ordered to pay US$ 121,549.37 in
restitution;
(b) R.H. was sentenced to 48 months’ imprisonment and ordered to pay US$ 7,681,570.03;
(c) C.J. was sentenced to 42 months’ imprisonment and ordered to pay US$ 9,517,129.29;
(d) R.G.A. was sentenced to 24 months’ imprisonment and ordered to pay US$ 310,791.90.
The other two defendants also pleaded guilty for their roles in the SIM hijacking and were sen-
tenced for their crimes and ordered to pay restitution.i R.S. was sentenced to probation in the United
States. C.F. pleaded guilty to knowingly engaging in the possession of the proceeds of crime
(i.e., cryptocurrencies) and was sentenced to two years and 11 months of imprisonment in Ireland.j
Following C.F.’s sentencing, the United States withdrew its extradition request for C.F.
For more information on these cases, see UNODC, SHERLOC case law database, Case No. USAx238.k
a
United States District Court, Eastern District of Michigan, United States of America v. Conor Freeman, Ricky Handschumacher,
Colton Juridic, Reyad Gafar Abbas, Garrett Endicott, and Ryan Stevenson, Case No. 2:19-CR-20246, Indictment, 18 April 2019, p. 2.
b
Ibid., p. 2.
c
Ibid., p. 1.
d
Ibid., p. 3.
e
Ibid., p. 2
f
Ibid., p. 3.
g
Ibid.
h
United States District Court, Eastern District of Michigan, United States of America v. Garrett Endicott, Case No. 2:19-CR-
20246-DPH-APP, Plea Agreement, 18 November 2019, pp. 1 and 7; and United States District Court, Eastern District of Michigan,
United States of America v. Ricky Handschumacher, Case No. 2:19-CR-20246-DPH-APP, Plea Agreement, 18 October 2019, p. 7.
i
U.S. Attorney’s Office, Eastern District of Michigan, “International hacking group members sentenced for SIM hijacking
conspiracy that resulted in the theft of millions in cryptocurrency”, 30 November 2021.
j
Brion Hoban, “Man jailed for role in $2 million cryptocurrency theft”, The Irish Times, 17 November 2020.
k
Available at https://sherloc.unodc.org/.
63
DIGEST OF CASES
The methods used by criminals to obtain non-digital and digital identity-related information include:
dumpster diving; mail theft or the redirection of mail; theft of identity documents; the use of publicly
available information (e.g. public records); skimming; phishing; “pharming” (a combination of the words
“phishing” and “farming”), or installing a malicious code on a computer or server that automatically
directs the user to a fraudulent website that mimics the appearance of a legitimate website; malware; and
hacking.176 Criminals may also obtain identity-related information by conducting simple searches for
such information using search engines, social media platforms, websites and online public and private
databases.177 All of the aforementioned online sites and repositories serve as a rich source of information
that includes a mix of data that individuals willingly share with the platforms, as well as data that are
collected, made available and distributed about individuals and consolidated about them without the
individuals’ knowledge and/or consent (or, at the very least, without their informed consent). This infor-
mation can then be widely distributed online via chat rooms, forums, websites, social media platforms,
peer-to-peer file-sharing networks, instant messaging, text messages and encrypted and unencrypted
communications applications, as well as via darknet sites.
The roles of individuals that were part of this criminal enterprise included the following:c
(a) Administrators. Administrators were responsible for long-term strategic planning of the
enterprise and daily management tasks such as determining responsibilities and levels of
access of all members, vetting prospective members, deciding which individuals could join the
organization, and rewarding and punishing existing members;
(b) Supermoderators. “Supermoderators” were responsible for moderating content by
reviewing contraband for sale, editing and deleting posts based on reviews, and mediating
disputes between buyers and vendors. The content they moderated was assigned on the basis
of either geographical area or criminal expertise;
(c) Moderators. Moderators had some of the same responsibilities for moderating content as
“supermoderators”, but had less authority and fewer privileges;
(d) Vendors. Vendors were individuals who sold and/or advertised illicit goods and services
on the site
(e) VIP members. VIP members were longstanding, distinguished members of the platform;
(f) Members. General members of the forum.
64
chapter V. Types of cyber organized crime
The founders of the organization were S.B. and S.M. In addition to being one of the founders,
S.M. served as the administrator of the forum and ran the escrow service of the organization,d
which was in place to minimize instances of vendor fraud. Fraudulent vendors were known on the
site as “rippers”.e These escrow services held funds for a purchase in escrow until the buyer
received the items purchased (in good order). For quality control of contraband recovered from acts
of fraud and identity theft, members also provided feedback and ratings of vendors and their prod-
ucts. To protect participants in this criminal enterprise, measures were taken to secure the forum
and restrict access to it. S.B. established rules governing members’ conduct, which were enforced
by administrators, moderators and “supermoderators” of the site.f Members who violated these
rules were punished by bans from the forum and other sanctions. All new members had to be
vetted before being granted access to the forum.
One of the founders of the Infraud Organization, S.M., pleaded guilty to conspiracy to engage in a
racketeer-influenced corrupt organization.g On 19 March 2021, he was sentenced to 10 years’
imprisonment.h The other founder, S.B., is currently still at large. V.C., a member of the Infraud
Organization and malware author, also pleaded guilty to conspiracy to engage in a racketeer-
influenced corrupt organization.i
For more information on these cases, see UNODC, SHERLOC case law database, Case No. USAx171.j
a
United States of America v. Svyatoslav Bondarenko et al., p. 6.
b
United States Department of Justice, Office of Public Affairs, “Russian national pleads guilty for role in transnational
cybercrime organization responsible for more than $568 million in losses”, press release, 26 June 2020.
c
United States of America v. Svyatoslav Bondarenko et al., pp. 12–14.
d
United States of America v. Svyatoslav Bondarenko et al., p. 15.
e
“Rippers” are individuals who do not deliver purchased items and/or deliver items of poor quality (United States of America
v. Svyatoslav Bondarenko et al., p. 9).
f
United States of America v. Svyatoslav Bondarenko et al., p. 25.
g
United States District Court, District of Nevada, United States of America v. Sergey Medvedev, Case No. 2:17-CR-306-JCM-
VCF, Plea Agreement, 26 June 2020.
h
United States Department of Justice, Office of Public Affairs, “Foreign nationals sentenced for roles in transnational
cybercrime enterprise”, press release, 19 March 2020.
i
United States District Court, District of Nevada, United States of America v. Valerian Chiochiu, Case No. 2:17-CR-306-JCM-
PAL, Plea Agreement, 31 July 2020.
j
Available at https://sherloc.unodc.org/.
The World Health Organization (WHO) defines “identity” as “the name, labelling or packaging or to documents that support
178
the authenticity of an authorized medical product” (document A/70/23, annex, appendix 3, para. 7 (c)).
WHO defines “composition” as “any ingredient or component of the medical product in accordance with applicable specifica-
179
tions authorized/recognized by” national and/or regional regulatory authorities (document A/70/23, annex, appendix 3, para. 7 (c)).
WHO defines “source” as “the identification, including name and address, of the marketing authorization holder, manufacturer,
180
importer, exporter, distributor or retailer, as applicable” (document A/70/23, annex, appendix 3, para. 7 (c)).
The WHO defines “deliberate/fraudulent misrepresentation” as “any substitution, adulteration, reproduction of an authorized
181
medical product or the manufacture of a medical product that is not an authorized product” (document A/70/23, annex, appendix 3,
para. 7 (c)).
182
UNODC, Combating Falsified Medical Product-Related Crime: A Guide to Good Legislative Practices (Vienna, 2019), p. 8.
65
DIGEST OF CASES
Also called “out of Medical products that have Medical products that
specification”, these are not undergone evaluation deliberately/fraudulently
authorized medical and/or approval by the misrepresent their
products that fail to meet national and/or regional identity, composition
either their quality regulatory authorities for or source
standards or their the market in which they
specifications, or both are marketed/distributed
or used, subject to
permitted conditions under
national or regional
regulation and legislation
Falsified medical products have negative public health, economic and socioeconomic consequences.183
They may be of poor quality, unsafe or ineffective. They may endanger health, prolong illness, promote
antimicrobial resistance and the spread of drug-resistant infection, and kill patients.184 They may also under-
mine confidence in health professionals, health-care systems and legitimate medical products, resulting in
further negative public health consequences if patients forego treatment or seek alternative treatment from
unregulated care providers.185
The coronavirus disease (COVID-19) pandemic has shed light on the threats posed by falsified medical
products.186 COVID-19 has been the catalyst for the emergence of a global market for trafficking in personal
protective equipment.187 There is also evidence of trafficking in other forms of falsified medical products
purporting to test, treat or prevent COVID-19.188
Trafficking in falsified medical products takes place both offline and online.189 Such trafficking takes place
via online marketplaces, online pharmacies, e-commerce platforms and social media and other platforms.190
In one case in the United States, two defendants sold counterfeit drugs for the treatment of cancer and hep-
183
See WHO, A Study on the Public Health and Socioeconomic Impact of Substandard and Falsified Medical Products (Geneva,
2017), pp. 15–19; WHO, WHO Global Surveillance and Monitoring System for Substandard and Falsified Medical Products (Geneva,
2017), pp. 5–7; see also Tim K. Mackey and Gaurvika Nayyar, “A review of existing and emerging digital technologies to combat the
global trade in fake medicines”, Expert Opinion on Drug Safety, vol. 16, No. 5 (April 2017), p. 587.
WHO, A Study on the Public Health and Socioeconomic Impact, pp. 15–16.
184
185
Ibid., p. 17.
186
See also UNODC, Research and Trend Analysis Branch and Global Research Network, “Report on COVID-19-related traffick-
ing of medical products as a threat to public health”, Research brief (Vienna, 2020).
187
Ibid., p. 10.
188
Ibid., p. 9.
189
See Tim K. Mackey and others, “Counterfeit drug penetration into global legitimate medicine supply chains: a global assess-
ment”, American Journal of Tropical Medicine and Hygiene, vol. 92, Suppl. No. 6 (2015).
WHO, “Substandard and falsified medical products”, 31 January 2018; and WHO, WHO Global Surveillance and Monitoring
190
System, p. 15.
66
chapter V. Types of cyber organized crime
atitis B to undercover officers via a well-known instant messaging service.191 The defendants (V.N.
and M.N.) pleaded guilty to conspiracy, trafficking in counterfeit drugs and smuggling goods into the
United States; one of the defendants (M.N.) also pleaded guilty to introducing misbranded medicine in
interstate commerce.192
In recent years, the number of online pharmacies, as well as the number of people purchasing medical
products online, has greatly increased.193 Nevertheless, the majority of online pharmacies conduct business
illegally and without appropriate safeguards, including by not requiring a valid prescription, operating with-
out a valid licence/certification and failing to meet national or international pharmacy regulations.194 Online
pharmacies pose particular challenges to investigating and prosecuting authorities, including practical
difficulties in identifying physical locations and jurisdictional challenges.195
The defendant, companies associated with him (Canada Drugs, Rockley Ventures, Global Drug
Supply and River East Supplies) and those conspiring with him were charged with: conspiracy to
smuggle goods into the United States in contravention of Title 18, sections 371 and 545, of the
United States Code; conspiracy to commit money-laundering in violation of Title 18, sections 1956
(h) and 1957; and international money-laundering in contravention of Title 18, section 1956 (a),
paragraph (2)(A). Ultimately, the defendant pleaded guilty to the crime of misprision of felony for
having knowledge of the actual commission of a felony cognizable by a court of the United States,
concealing the felony and not informing a judge or other person in civil or military authority under
the United States of the felony.b For this crime, the defendant was sentenced to five years of proba-
tion and six months of house arrest and was required to pay a fine of US$ 250,000.
CanadaDrugs.com ceased its operations in 2018, and Canada Drugs was required to surrender its
domain names. Canada Drugs and its associated companies were sentenced to five years’ proba-
tion and were required to forfeit US$ 29 million in proceeds and to pay a fine of US$ 5 million.c
For more information about this case, see UNODC, SHERLOC case law database, Case No. USAx108.d
a
United States of America v. Kristjan Thorkelson, 14-CR-27-BU-DLC (D. Mont., 10 December 2018).ed States Code, Title 18,
sect. 4, Misprision of felony.
b
United States Code, Title 18, sect. 4, Misprision of felony.
c
United States Attorney’s Office, District of Montana, “Canadian drug firm admits selling counterfeit and misbranded
prescription drugs throughout the United States”, press release, 13 April 2018.
d
Available at https://sherloc.unodc.org/.
191
UNODC, SHERLOC case law database, Case No. USAx227, United States of America v. Nienadov, No. 4:19 CR-365
(S.D. Tex. Mar. 29, 2021).
192
Ibid.
WHO, WHO Global Surveillance and Monitoring System, p. 15.
193
194
Mackey and Nayyar, “A review of existing and emerging digital technologies”, p. 589.
WHO, A Study on the Public Health and Socioeconomic Impact, p. 22; WHO, WHO Global Surveillance and Monitoring
195
System, p. 16.
67
DIGEST OF CASES
4. Counterfeiting
Counterfeiting involves the unlawful manufacture, sale and distribution of fake currency, documents or
products.196 Counterfeits are created for a variety of identity-related documents (e.g., identification docu-
ments, passports, driving licences), money and goods such as food, drinks, electronics, software, toys,
automobile parts, chemicals, alcohol, cigarettes, clothing, shoes, accessories, toiletries and household
products. Counterfeit products pose significant threats to the economy, the environment, and health
and safety.197
Traditional organized criminal groups are involved in trafficking in counterfeit products. The groups mainly
do not necessarily focus exclusively on trafficking in counterfeit products but commit this form of traffick-
ing along with other forms of serious crime, such as a drug trafficking, trafficking in persons and money-
laundering.198 The funds obtained from trafficking in counterfeit products are often subjected to money-
laundering and/or used to develop and sell more counterfeit goods and/or engage in other forms of serious
crime.199
The availability, manufacture and distribution of counterfeit products have expanded as a result of the ease
of movement of individuals across borders and advances in ICT.200 Organized criminal groups have pro-
duced, sold and distributed counterfeit money, documents and goods throughout the world, advertising the
sale of these items on both the clearnet and the darknet. Trafficked counterfeit products enter the market
either by being introduced into the legitimate market through online commercial websites, social media
platforms and/or other places online or by being introduced into the illegitimate market, for example,
through the sale of counterfeit products on darknet sites predominantly dedicated to the sale of illicit
goods and services. The illegal markets online were termed by a German court as the “underground illegal
economy”.201
Counterfeit products can be created, represented and/or marketed to look like copyrighted, trademarked
and/or patented goods in violation of intellectual property laws. One example is pirated copyright goods,
which are defined in the Agreement on Trade-Related Aspects of Intellectual Property Rights (art. 51) as
any goods which are copies made without the consent of the right holder or person duly authorized by the
right holder in the country of production and which are made directly or indirectly from an article where the
making of that copy would have constituted an infringement of a copyright or a related right under the law
of the country of importation.202 For example, in Queen v. Paul Mahoney,203 the appellant, with other known
and unknown conspirators, created and operated websites that enabled individuals to access and view newly
released films and television programmes for free.
196
For more information on counterfeiting, see UNODC, The Globalization of Crime: A Transnational Organized Crime Threat
Assessment (United Nations publication, 2010), chap. 8.
197
UNODC, “Counterfeit goods: a bargain or a costly mistake?”, Factsheet (2012); Italy, Ministry for Economic Development,
Department for Enterprise and Internationalization, General Anti-Counterfeiting Directorate, “No to fake: the counterfeiting in the
food sector–consumer guide” (Rome, n.d.).
198
UNODC, “Counterfeit goods”.
199
UNODC, “‘Counterfeit: don’t buy into organized crime’ – UNODC launches new outreach campaign on $250 billion a year
counterfeit business”, 14 January 2014.
200
UNODC, “Counterfeit goods”.
This case involved the sale of counterfeit money and forged identification documents, as well as the sale of drugs, on online
201
illicit markets (UNODC, SHERLOC case law database, Case No. DEUx025, LG Duisburg, Urteil vom 05.04.2017, 33 KLs – 111 Js
32/16 – 8/16).
WHO, document A/70/23, annex, appendix 3, footnote 1.
202
203
United Kingdom of Great Britain and Northern Ireland, Queen v. Paul Mahoney [2016] NICA 27.
68
chapter V. Types of cyber organized crime
In France, the national police were made aware of the Boom-e-rang forum when a third party who
was being investigated for electronic fraud divulged the name of two members of the forum and
informed the police of the offences that they had committed. The national police conducted elec-
tronic surveillance of the forum and collected several IP addresses that were used to identify forum
members.
In this case, the defendants were charged with illegal access to a computer system with the aggra-
vating factor of system interference, as well as with illegal introduction of data into a computer
system. As the system interference resulted from the illegal introduction of data into the computer
systems (reducing their storage capacity) and not illegal access to the computer system itself,
the court held that the aggravating factor of system interference could not be applied to the case.
The court also held that the offence of illegal access to a computer system could be applied even if
the computer systems that had been accessed had not been protected from breach.
The 13 defendants were convicted of charges relating to hacking into servers, uploading pirated
material to the servers and downloading pirated material from the servers. One defendant, J.D.,
was found guilty of committing a scam and was sentenced to 10 months’ imprisonment. All the
other defendants were sentenced to terms of imprisonment ranging from two to four months. All
custodial sentences were suspended.
The two defendants convicted for offences related to the stolen credit card scam were ordered to
pay a symbolic sum of €1 to the victim, as well as €200 for legal fees. All defendants were sen-
tenced to pay jointly €1 as provisional damages to the 23 other victims, with the matter being
referred to a civil court for further determination.
For more information about this case, see UNODC, SHERLOC case law database, Case No. FRAx028.a
a
Available at https://sherloc.unodc.org/.
Perpetrators of online copyright infringement may be part of communities that illegally distribute copy-
righted works for free to obtain accolades from members of their community. For instance, in Regina v.
Reece Baker and Sahil Rafiq,204 the appellants (S.R. and R.D.B.) had leadership roles in release groups
(i.e., they formed and/or ran the groups), which often competed with each other to make the best copy of
an original copyrighted work freely and widely available or to be the first to illegally release a copy-
righted work.
204
United Kingdom, Royal Courts of Justice, Regina v. Reece Baker and Sahil Rafiq [2016] EWCA Crim 1637, Approved
Judgment, 18 October 2016.
69
DIGEST OF CASES
On the website, the defendant and his accomplices provided over one million links to copyrighted
works of film and television free of charge, without having the rights to do so. In total, 1,360,450 links
were made public on this website. The links were used to stream or download the pirated content. The
pirated content was hosted on file hosting services selected by uploaders (those who uploaded pirated
content to the website). The uploaders and file host service providers were not part of the core
employees of Kino.to. However, some of the file host services used by the site were operated by the
defendant or the members of the group who were subsequently prosecuted separately. File hosting
services that were operated by the defendant or other members of the group were preferred and were
given competitive advantage in that their links were placed on the top of the website.
Communication between the core employees usually took place using a well-known software
application that provides videophone and videoconferencing capabilities. Written communication
took place using the message tool of the access control protocol. When important decisions
were to be made, videoconferences were held, and all core employees would usually participate.
The employees tasked with publishing the links were responsible for communicating – using
their aliases – with the uploaders and file hosting service providers via the same access control
protocol.
The defendant was prosecuted for the commercial exploitation of copyrighted works contrary to
intellectual property laws.a The court held that the inclusion of pages on a site that was linked to
stored copyright content on a different site (e.g. content-sharing hosting sites) without the consent
of the copyright holder was a violation of copyright law.b For the over one million counts of commer-
cial unlawful exploitation of copyrighted works to which the defendant pleaded guilty, he received
a sentence of four years and six months of imprisonment and was required to pay more than
€3.7 million in compensation.
For more information on this case, see UNODC, SHERLOC case law database, Case No. DEUx033.c
a
Specifically, section 106 of the German Act on Copyright and Related Rights (Urheberrechtsgesetz) (see UNODC SHERLOC
case law database, Case No. DEUx033).
b
LG Leipzig, Urteil vom 14.06.2012, 11 KLs 390 Js 191/11 (kino.to was the largest German-language platform providing
links to pirated copies of films and television shows).
c
Available at https://sherloc.unodc.org/.
70
chapter V. Types of cyber organized crime
205
Marie-Helen Maras, Real Criminology (forthcoming).
206
See UNODC Teaching Modules, Cybercrime, Module 12: Interpersonal cybercrime. Available at sherloc.unodc.org/cld/en/
education/tertiary/cybercrime/module-12/index.html.
207
United States District Court, Eastern District of Missouri, United States of America v. Nathan Wyatt, Case No. 4:17CR00522
RLW/SPM, Indictment, 8 November 2017.
208
United States, Department of Justice, Office of Public Affairs, “UK national sentenced to prison for role in ‘The Dark Overlord’
hacking group”, press release, 21 September 2020.
209
Image-based sexual abuse is defined in academic literature as the “non-consensual creation, distribution and threat to distribute
nude or sexual images” (Nicola Henry, Asher Flynn and Anastasia Powell, “Policing image-based sexual abuse: stakeholder perspec-
tives”, Police Practice and Research: An International Journal, vol. 19, No. 6 (September 2018), pp. 565–581).
71
DIGEST OF CASES
Rajesh and others v. State of Rajasthan, Division Bench Appeal No. 178, 122 and
123 / 2016 (India)
The case Rajesh and others v. State of Rajasthan involved the rape and sextortion of a 17-year-old
female. When the victim was walking home from school, the three defendants asked her to board
their vehicle. When the victim refused, they forcibly kidnapped her and covered the rear window of
the vehicle with a curtain. The defendants stuffed the victim’s mouth, and she was forcibly removed
from the vehicle and dragged into a jungle where she was stripped and raped by the defendants.
She was subsequently driven back to her village. The defendants made a video recording of the rape
on a mobile phone and threatened to circulate the recording and share it with her relatives if she
disclosed the rape to anyone. The victim did not talk about the incident out of fear that doing so
would damage her reputation and that it might lead to her engagement being broken off. She felt so
intimidated by the threats of the defendants that she stopped going to school and was under
immense mental stress.
The defendants also attempted to blackmail her into performing further sexual acts by threatening
to make available online the video recording of her rape if she did not agree to their demands. This
sextortion continued for more than one year after the rape occurred. When the victim refused to
agree to her sexual exploitation, the defendants uploaded the video recording on the Internet. The
recording was seen by one of the victim’s relatives, who brought it to her father’s attention.
Thereafter, the victim lodged a written complaint to the court. The court convicted the three defend-
ants of rape,a violation of privacy,b publishing or transmitting obscene material in electronic form,c
publishing or transmitting material containing a sexually explicit act in electronic form,d publishing
or transmitting material depicting children in a sexually explicit act in electronic form,e kidnapping,
abducting or inducing a woman to compel her marriage,f procuration of a minor girl,g kidnapping or
abducting in order to subject a person to grievous harm, slavery,h distribution of obscene materiali
and criminal conspiracy.j The three defendants were sentenced to life imprisonment. On appeal,
their sentences were reduced to 10 years of imprisonment. The defendants were also required to
pay a fine of 392,000 rupees.
For more information about this case, see UNODC, SHERLOC case law database, Case No. INDx032.k
a
R. was convicted pursuant to section 376, clause (g), of the Indian Penal Code of 1860; S.S. and D. were convicted pursuant
to section 376, subsection (2), clause (g), of the Indian Penal Code.
b
Section 66E of the Information Technology Act, 2000, of India.
c
Section 67 of the Information Technology Act.
d
Section 67A of the Information Technology Act.
e
Section 67B of the Information Technology Act.
f
Section 366 of the Indian Penal Code.
g
Section 366A of the Indian Penal Code.
h
Section 367 of the Indian Penal Code.
i
Section 292 of the Indian Penal Code.
j
Section 120B of the Indian Penal Code.
k
Available at https://sherloc.unodc.org/.
A common tactic of perpetrators of sextortion is the utilization of fake profiles online to target the victims,
using various websites, forums, chat rooms, social media platforms and messaging applications. The perpetra-
tors ultimately seek to coerce their targets into performing sexual acts via webcam and/or to create and/or
distribute sexual images or video recordings. The images or recordings are then used to threaten the victim.
The perpetrator threatens to reveal the images or recordings to the victim’s family, friends, significant others,
employers, colleagues, classmates and/or others if the victim does not provide more sexualized media content,
pay the perpetrator and/or engage in some other act desired by the perpetrator.
72
chapter V. Types of cyber organized crime
The defendants were charged with conspiracy to commit wire fraud, extortion and money-launder-
ing. Several of the defendants pleaded guilty to one or more of these crimes. T.R. pleaded guilty and
was sentenced to three years’ probation for conspiracy to commit wire fraud.e Another defendant,
W.W., also pleaded guilty to conspiracy to commit wire fraud, but has not been sentenced yet.f
Another defendant, A.M., pleaded guilty to conspiracy to commit wire fraud and money-laundering,g
while other defendants, J.T., B.T., and F.B., pleaded guilty to money-laundering.h J.T. and B.T. each
received time served and 15 months’ imprisonment for their crimes. D.P.D pleaded guilty to all three
charges and was sentenced to 3 years and 10 months of imprisonment. The prosecution also sub-
mitted a motion to dismiss the indictment against one of the defendants, L.M.i
For more information on this, see UNODC, SHERLOC case law database, Case No. USAx172.j
a
United States Attorney’s Office, District of South Carolina, “5 inmates among 15 defendants indicted for wire fraud,
extortion, and money laundering scheme at SCDC”, press release, 29 November 2018.
b
United States District Court, District of South Carolina, United States of America v. Antwine Lamar Matthews, Malcolm
Cooper, Andreika Mouzon and Flossie Brockington, Case No: 2:18-CR-1024, Indictment, 14 November 2018, pp. 2–3.
c
Ibid.; United States District Court, District of South Carolina, United States of America v. Jimmy Dunbar, Jr. and Mitchlene
Padgett, p. 3; United States of America v. Rakeem Spivey and Roselyn Pratt, p. 3; United States District Court, District of South
Carolina, United States of America v. David Paul Dempsey and Edgar Jermaine Hosey, Case No. 2:18-CR-1022, Indictment,
14 November 2018, pp. 2–3; United States District Court, District of South Carolina, United States of America v. Wendell Wilkins,
Jalisa Thompson, Tiffany Reed, Brandon Thompson and Laben McCoy, Case No. 2-18-CR-101, Indictment, 14 November 2018, p. 2.
d
United States of America v. Jimmy Dunbar, Jr. and Mitchlene Padgett, p. 3; United States of America v. Rakeem Spivey and
Roselyn Pratt, p. 3.
e
For further information, see United States District Court, District of South Carolina, United States of America v. Tiffany
Reed, Case No. 2:18-CR-1017-DCN, 4 May 2020; United States of America v. Brandon Thompson, Judgement, 20 December 2019.
f
For further information, see United States of America v. Wendell Bernard Wilkins, Case No. 2:18-cr-01017-DCN-1, Plea,
2 December 2019.
g
For further information, see United States Attorney’s Office, District of South Carolina, “Two money mules plead guilty in
Federal Court for role in sextortion scheme”, press release, 31 July 2019.
h
For further information, see United States District Court, District of South Carolina, United States of America v. Jalisa
Thompson, Sentencing Memorandum in Support of Downward Departure and or Defendant, Case No. 2:18-CR-01017-002,
2 December 2019; United States Attorney’s Office, District of South Carolina, “Two money mules plead guilty in Federal Court”.
i
For further information, see United States District Court, District of South Carolina, United States of America v. Laben
Weykshaw Renee McCoy, Case No. 2:18-CR-1017-5, Motion to Dismiss Indictment, 15 September 2020.
j
Available at https://sherloc.unodc.org/.
73
DIGEST OF CASES
Between 6 and 9 February 2018, Victim 2 received various telephone calls from different numbers,
including calls from Victim 1’s number via a well-known messaging application that uses the
Internet. The callers sent images of Victim 1 (simulated images designed to make Victim 1 appear
to be a victim of kidnapping) to Victim 2 via the messaging app and threatened to kill Victim 1. Using
threats and intimidation, the extortionists persuaded Victim 2 to deposit 2,148,160 Mexican pesos in
various bank accounts, including one under the accused person’s name. Victim 2 reported the
extortion to the local police, who managed to locate Victim 1 on 9 February 2018.
210
United States District Court, Southern District of Florida, United States of America v. Hidalgo Marchan, Case No. 1:15-CR-
20471, 23 June 2015.
211
United States, Department of Justice, Office of Public Affairs, “Three men extradited for overseeing call centers that threatened
and defrauded Spanish-speaking U.S. consumers”, press release, 19 December 2019.
212
United States, Department of Justice, Office of Public Affairs, “Peruvian man pleads guilty to overseeing call centers that
threatened and defrauded Spanish-speaking U.S. consumer”, 1 May 2020.
213
Ibid.; United States, Department of Justice, Office of Public Affairs, “Three men extradited for overseeing call centers”.
The person may or may not be kidnapped (or otherwise held) by the perpetrators of this crime.
214
74
chapter V. Types of cyber organized crime
A person incarcerated in a federal prison in the city of Tamaulipas was identified as the leader of
the organized criminal group. He led and coordinated the virtual kidnapping operation from prison.
The prosecutor’s office had information about the modus operandi of the criminal group because
the mobile phone number of one of the extortionists in this case had been linked to complaints filed
by victims in 15 similar cases.
Deposits of money stemming from the proceeds of this cyber-enabled crime had been made in the
United States through certain companies where other members of the criminal group went to col-
lect the money. Video recordings of these transactions were gathered, enabling other members of
the group to be identified. A chronological series of images were also obtained from video record-
ings from the different offices where the money deposits were withdrawn.
In this case, investigative and prosecutorial challenges were highlighted. The defence argued that
some of the evidence presented in court had been obtained illegally. For example, authorization
from a federal judge had not been obtained before extracting data from seized devices, in contra-
vention of article 16 of the Constitution. There were also inconsistencies and missing information in
the chain of custody for some of the evidence introduced in court.
Ten members of the criminal group were captured and nine members were sentenced to 22 years
and 6 months of imprisonment. The defendants who were sentenced for their crimes were also
required to pay restitutiona to Victim 2 (Mex$ 37,800 for psychological therapy and Mex$ 2,148,160,
the exact amount the sent by Victim 2 to the criminal group) and to Victim 1 (Mex$ 40,500 for
psychological therapy).
For more information about this case, see UNODC, SHERLOC case law database, Case No. MEXx004.b
a
This restitution was made in in accordance with article 20, section B, of the Political Constitution of the United Mexican
States, as well as articles 43–51 of the Penal Code for the State of Chihuahua.
b
Available at https://sherloc.unodc.org/.
(c) Ransomware
Ransomware is a form of malware that infects a user’s device and posts a warning on the device that, if the
victim does not make a payment, there will be some negative consequence to the owner of the device. This
type of malware may also be designed to block access to data, files and/or systems; the access is to be restored
when a sum of money (i.e., ransom) is paid. One form of ransomware is crypto-ransomware, a Trojan Horse
designed to encrypt data on a victim’s system and extort money from the victim to release information.215
In its report Internet Organised Crime Threat Assessment 2020, Europol noted that ransomware remains a
significant threat both within and outside of Europe.216 Individuals, businesses, non-governmental organiza-
tions and government agencies are targeted by ransomware. Ransomware is largely an underreported crime,
particularly when it involves the private sector, which may fear the negative effects of reporting this cyber-
crime (e.g., reputational harm, exposure to further cybervictimization by other perpetrators).217 Ransomware
has evolved from targeting individual users of ICT to becoming more targeted and focusing on public and
private organizations.218 Initially, crypto-ransomware threatened to permanently prevent targets from
accessing files, data and/or their systems unless payment was rendered. However, cybercriminals have
deployed crypto-ransomware, which threatens to wipe data from devices and/or auction data online if
money is not paid.219 When criminals threaten to release personal data online unless payment is made, this
is a form of “doxxing”.
215
Maras, Cybercriminology, p. 334.
216
Europol, Internet Organised Crime Threat Assessment 2020, p. 25.
217
Ibid., p. 28.
218
Ibid., p. 25.
219
Ibid., p. 26.
75
DIGEST OF CASES
In 2021, the defendant S.V.-D. was arrested and detained in Canada pursuant to an extradition
order by the United States. S.V.-D. was not surrendered to the United States because he had out-
standing drug trafficking charges in Quebec. Those charges were subsequently resolved on
21 January 2022, when he was sentenced to 54 months of imprisonment for five drug trafficking
and related charges and possession of property obtained by crime.c Regarding his involvement in
the criminal group’s ransomware-as-a-service operation, on 1 February 2022, he pleaded guilty to
mischief in relation to computer data, unauthorized use of a computer, extortion and participation
in the activities of a criminal organization.d For these crimes, he was sentenced to serve six years
and eight months of imprisonment. The defendant was also ordered to pay restitution in the amount
of 2,805,829.97 Canadian dollars and forfeit cryptocurrencies (e.g. bitcoin) and Canadian dollars
from accounts and safe deposit boxes in Canada.e Having participated in designated offences
(i.e., extortion and participation in the activities of a criminal organization) for which DNA is ordered
for collection and storage in the DNA databank, the defendant was also ordered to provide a DNA
sample for inclusion in the databank.f
For more information on this case, see UNODC, SHERLOC case law database, Case No. CANx148.g
a
United States, Department of Justice, Office of Public Affairs, “Department of Justice launches global action against
NetWalker ransomware”, 27 January 2021.
b
Ibid.
c
R. v. Vachon-Desjardins, 2022 ONCJ 43, p. 2.
d
Ibid., p. 8
e
Ibid., p. 9.
f
Ibid., p. 8.
g
Available at https://sherloc.unodc.org/.
220
Susanna Greijer and Jaap Doek, Terminology Guidelines for the Protection of Children from Sexual Exploitation and Sexual
Abuse, adopted by the Interagency Working Group in Luxembourg, 28 January 2016 (Luxembourg, ECPAT International and ECPAT
Luxembourg, 2016), pp. 23 and 28.
221
Ibid., p. 25.
222
UNICEF, “Building knowledge and awareness: sexual violence”, Communities Care: Transforming Lives and Preventing
Violence Programme (New York, 2014).
223
UNODC, Study on the Effects of New Information Technologies on the Abuse and Exploitation of Children (Vienna, 2015).
76
chapter V. Types of cyber organized crime
national, regional and international laws.224 The manner in which online child sexual abuse and child sexual
exploitation are criminalized by law, however, varies.
Three types of offences involving child sexual abuse and child sexual exploitation are covered in the sub-
sections that follow: child sexual abuse material and child sexual exploitation material, the enticement or
solicitation of children to engage in sex acts (i.e., child grooming) and live-streaming child sexual abuse.
(a) Child sexual abuse material and child sexual exploitation material
The term “child pornography” has been rejected by civil society, law enforcement agencies, academics and
others because it minimizes what is actually occurring – child sexual abuse and not sex with a child.225 The
preferred term is “child sexual abuse material”. While child sexual abuse material depicts child sexual
abuse, all other sexualized material depicting children is considered “child sexual exploitation material”.226
Nevertheless, the term “child pornography” still exists in national, regional and international laws. In the
present digest, the terms “child pornography” and “child pornographic material” are used only when they
appear in laws and case law referenced in the digest, in recognition of the efforts of multiple actors at the
State and civil society levels working for more consistent language that respects and considers child rights
throughout advocacy, policy and laws in all languages across all regions of the world.
Laws criminalizing the possession, production and distribution of child sexual abuse material and child
sexual exploitation material vary by jurisdiction. Some jurisdictions do not proscribe computer-generated
child sexual abuse material, which refers to the production, through digital media, of child sexual abuse
material and other wholly or partly artificially or digitally created sexualized images of children;227 they
proscribe only images depicting real children.228 In some countries, possession of child sexual abuse mate-
rial is criminalized if there is an intent to distribute the material.229 In those countries, the possession of the
material alone would not be considered criminal.
Child sexual abuse material and child sexual exploitation material are created, shared and distributed via web-
sites, Internet newsgroups, web-conferencing software, social media platforms, unencrypted and encrypted
communication applications and other online platforms.230 This material is also shared using text messages,
instant messaging, email messages, chat rooms, bulletin boards and peer-to-peer file-sharing networks.231
Perpetrators of online child sexual abuse and child sexual exploitation can be part of large online commu-
nities232 or smaller communities where child sexual abuse material is sent directly between perpetrators
224
See, for example, the Optional Protocol to the Convention on the Rights of the Child on the sale of children, child prostitution
and child pornography, the Council of Europe Convention on the Protection of Children against Sexual Exploitation and Sexual Abuse
(also known as the Lanzarote Convention), the Cybercrimes (Prohibition, Prevention, etc.) Act, 2015, of Nigeria (sect. 23); directive
2011/93/EU of the European Parliament and of the Council of 13 December 2011 on combating the sexual abuse and sexual exploita-
tion of children and child pornography, replacing Council framework decision 2004/68/JHA of 22 December 2003 on combating the
sexual exploitation of children and child pornography; article 27 of the African Charter on the Rights and Welfare of the Child; and
Republic Act No. 9775 of the Philippines (known as the Anti-Child Pornography Act of 2009).
225
For more information, see UNODC Teaching Modules, Cybercrime, Module 2: General types of cybercrime, “Computer-
related offences” Module 12: Interpersonal cybercrime, “Online child sexual exploitation and abuse”. Available at sherloc.unodc.
org/cld/en/education/tertiary/cybercrime/module-2/index.html and sherloc.unodc.org/cld/en/education/tertiary/cybercrime/
module-12/index.html.
226
Greijer and Doek, Terminology Guidelines for the Protection of Children, pp. 39–40.
227
Ibid., p. 40.
228
International Centre for Missing and Exploited Children, Child Pornography: Model Legislation and Global Review, 8th ed.
(Alexandria, Virginia, 2016), p. 40; Greijer and Doek, Terminology Guidelines for the Protection of Children, p. 40.
229
International Centre for Missing and Exploited Children, Child Pornography, pp. 18–42.
230
Maras, Cybercriminology; Australia, R v. Mara [2009] QCA 208 (Internet newsgroups); Canada, Provincial Court of
Saskatchewan, R v. Philip Michael Chicoine, 2017 SKPC 87 (Communication applications); and United States Court of Appeals,
Third District, United States of America v. Dylan Heatherly, Case No. 19-2424 (2020) and United States of America v. William Staples,
No. 19-2932 (2020) (Web-conferencing software).
231
See, for example, R v. Philip Michael Chicoine, 2017 SKPC 87 (Peer-to-peer sharing platforms); Germany, Federal Court of
Justice, Decision 2 StR 321/19 of 15 January 2020 (BGH, Beschluss vom 15.01.2020, 2 StR 321/19); United States of America v.
Caleb Young (Chat rooms); and United States District Court, Western District of North Carolina, United States of America v. Steven W.
Chase, Case No. 5:15-CR00015-001, 8 May 2017 (Bulletin board).
232
See, for example, United States of America v. John Doe #1, Edward Odewaldt et al. (Dreamboard); Germany, Federal Court
of Justice, Decision 2 StR 321/19 of 15 January 2020 (BGH, Beschluss vom 15.01.2020, 2 StR 321/19); Europol, Internet Organised
Crime Threat Assessment 2020, p. 38.
77
DIGEST OF CASES
using various applications, such as encrypted messaging platforms.233 The online communities of child sex
offenders are tightly controlled with platform affiliation rules and codes of conduct.234 Rules are enforced
by moderators and administrators of the site, and members of the site must follow the official affiliation
rules and codes of conduct in order to remain active members on the site.235 Within these forums, individu-
als are often promoted based on their contributions on the site and/or rewarded for their contributions.
Active participation in the forums builds a person’s reputation and can increase a person’s position, stand-
ing and/or rank within the community. Active participation in these forums is associated with the advertise-
ment, posting, distribution or otherwise making available of child sexual abuse material and child sexual
exploitation material. To maintain access to the sites and/or to gain access to more child sexual abuse and
child sexual exploitation material on the site, members have to continuously post such material. Failure to
contribute to the site would lead to a revocation of privileges and removal from the site. Some child sexual
abuse and child sexual exploitation sites (e.g., Dreamboard and the Giftbox Exchange) also require new
members to post child sexual abuse material during registration for verification purposes,236 whereas other
sites (e.g., Elysium) did not have these requirements.237
Organized criminal groups predominantly follow profit-driven models that are characteristic of legitimate and
illegitimate organizations. Europol, in its report Internet Organised Crime Threat Assessment 2020, identified
a trend in the commercialization of child sexual abuse material and child sexual exploitation material:238 the
monetization of such material on the clearnet and the darknet.239 Individuals receive credit based on the number
of downloads of the content they upload to the site and get paid via cryptocurrencies or other forms of pay-
ment.240 An example of this is the case in the Republic of Korea involving the website Welcome to Video
(see chap. IV), whereby bitcoin was used to monetize child sexual exploitation material.241
R v. Philip Michael Chicoine [2017] S.J. No. 557, 2017 SKPC 87 (Canada)
The defendant, P.M.C., lured children to commit sexual assault and produce child sexual abuse
material, had in his possession child sexual abuse material (over 4,132 unique images and 582
videos of child sexual abuse) and created, accessed, shared and/or otherwise distributed child
sexual abuse material online, using a well-known communication application, a well-known mes-
saging application, instant messaging service applications and peer-to-peer file-sharing plat-
forms.a The defendant used a communication application to communicate with child sex offenders
located in the Philippines and Romania and paid those individuals to sexually abuse female children
4–9 years old, directing the offenders as to what specific type of sexual abuse he wanted to see. The
child sexual abuse material was either pre-recorded or live-streamed.b The defendant also directly
communicated with children through an instant messaging service and sexually exploited them,
sending them sexualized and graphic images, including images of his penis, offering them money
in exchange for images of their vaginas and directing the child victims to give the defendant’s messag-
ing service account to other young girls. The exact number of the defendant’s victims is not known.
233
See, for example, United States of America v. Caleb Young, p. 3 (the Bored group); see also Europol, Internet Organised Crime
Threat Assessment 2020, p. 37.
234
Europol, Internet Organised Crime Threat Assessment 2020, p. 38.
235
Ibid.
236
United States of America v. John Doe #1, Edward Odewaldt et al. (Dreamboard); Germany, Federal Court of Justice, Decision
2 StR 321/19 of 15 January 2020 (BGH, Beschluss vom 15.01.2020, 2 StR 321/19) (the Giftbox Exchange); see also Maras,
Cybercriminology, chap. 10.
237
Germany, Federal Court of Justice, Decision 2 StR 321/19 of 15 January 2020 (Elysium) (BGH, Beschluss vom 15.01.2020,
2 StR 321/19); see also Maras, Cybercriminology, chap. 10.
238
Ibid.
239
Europol, Internet Organised Crime Threat Assessment 2020, p. 40; see also, Costa Rica, Tribunal Penal del Tercer Circuito
Judicial de San José, Causa penal No. 15-001824-0057-PE & Causa Penal No. 19-000031-0532-PE (Operación R-INO); Argentina,
Tribunal Oral Federal de Jujuy, Causa FSA 8398/2014/TO1; and Republic of Korea, Seoul Central District Court (Criminal Department
I-I), 2018NO2855, 2 May 2019.
240
Ibid.
241
Republic of Korea, Seoul Central District Court (Criminal Department I-I), 2018NO2855, 2 May 2019.
78
chapter V. Types of cyber organized crime
The defendant pleaded guilty to over 40 offences involving child sexual abuse and child sexual
exploitation, including conspiracy charges relating to creating child sexual abuse material. He was
sentenced to 12 years’ imprisonment for his offences and was required to register as a sex offender
for life (pursuant to the Sex Offender Information Registration Act of Canada). The defendant was
also prohibited from using the Internet or any other digital network to access content that violates
the law, to communicate with a minor, to directly or indirectly access any social media sites, social
networks, Internet discussion forums or chat rooms or to maintain a personal profile on any such
service.c Furthermore, he was required to pay a “victim fine surcharge” of 200 Canadian dollars for
each of the 40 counts to which he had pleaded guilty, for a total of $Can 8,000.d
For more information on this case, see UNODC, SHERLOC case law database, Case No. CANx138.e
a
R v. Philip Michael Chicoine [2017] S.J. No. 557, 2017 SKPC 87, para. 11.
b
For further information about live-streaming child sexual abuse, see chap. V, sect. B.6, below.
c
R v. Philip Michael Chicoine [2017] 2017 SKPC 87, para. 67 (d) (iii).
d
Ibid., para. 68.
e
Available at https://sherloc.unodc.org/.
242
Greijer and Doek, Terminology Guidelines for the Protection of Children, p. 49.
243
Alessia Altamura, “Online child sexual abuse and exploitation: spotlight on female sex offenders”, ECPAT International
Journal: Online Child Sexual Exploitation – An Analysis of Emerging and Selected Issues, No. 12 (2017), pp. 26–46.
There are exceptions, such as section 131B of the Crimes Act 1961 of New Zealand, which is entitled “Meeting young
244
person following sexual grooming, etc.”; section 15 of the Sexual Offences Act 2003 of the United Kingdom; the Council of Europe
Convention on the Protection of Children against Sexual Exploitation and Sexual Abuse; and directive 2011/93/EU replacing Council
framework decision 2004/68/JHA.
245
See Costa Rica, Penal Code, art. 167 bis (Seduction or encounters with minors through electronic means); Antigua and Barbuda,
Electronic Crimes Act, art. 10 (Entice); Council of Europe Convention on the Protection of Children against Sexual Exploitation and
Sexual Abuse, art. 23 (Solicitation of children for sexual purposes); and directive 2011/93/EU. Germany uses the word “influences”
(see the German Criminal Code (Strafgesetzbuch), sect. 176 (Sexual abuse of children)).
246
Council of Europe Convention on the Protection of Children against Sexual Exploitation and Sexual Abuse; directive 2011/93/
EU; section 15 of the Sexual Offences Act 2003 of the United Kingdom.
247
For more information about the countries that have these laws, see International Centre for Missing and Exploited Children,
Online Grooming of Children for Sexual Purposes: Model Legislation and Global Review (2017), p. 7.
248
Kenneth V. Lanning, Child Molesters: A Behavioral Analysis for Professional Investigating the Sexual Exploitation of Children,
(Alexandria, Virginia, National Center for Missing and Exploited Children, 2010; Georgia M. Winters and Elizabeth L. Jeglic, “Stages
of sexual grooming: recognizing potentially predatory behaviors of child molesters”, Deviant Behavior, vol. 38, No. 6 (2017),
pp. 724–733; Rachel O’Connell, “A typology of cybersexploitation and online grooming practices (Preston, United Kingdom,
University of Central Lancashire, Cyberspace Research Unit, 2003); Susan Aitken, Danielle Gaskell and Alan Hodkinson, “Online
sexual grooming: exploratory comparison of themes arising from male offenders’ communications with male victims compared to
female victims”, Deviant Behavior, vol. 39, No. 9 (February 2018), pp. 1170–1190.
79
DIGEST OF CASES
Members of the Bored group had distinct roles: “hunters”, “talkers” and “loopers”.g “Hunters”
would lure victims to the chat room.h Once the victims had joined the chat room, “talkers” would
attempt to convince them to undress and masturbate on camera by engaging them in conversation
and building trust and rapport.i “Loopers” would pose as female minors and play a pre-recorded
video of another minor talking or engaging in sex acts, which the “loopers” would seek to pass off
as an event happening in real time.j The “loopers” would play the pre-recorded videos in an effort to
convince the girls to perform a sex act.
One method used to monitor, evaluate and coordinate their activities, track progress and share
their knowledge and expertise was to discuss their plans, activities and experiences on a separate
site (the now defunct TitanPad) and record their activities and experiences on a password-protected
spreadsheet on that site that included information about which chat rooms on the website were
associated with which victims and the social media accounts associated with members that were
used to lure each of the victims.k The spreadsheet also enabled the members of the group to keep
track of the manipulation techniques that had been successful with each victim and what sex acts
80
chapter V. Types of cyber organized crime
each victim had engaged in (the sex acts included extremely depraved acts; for example, one
member of the group had enticed a minor to engage in a sex act with a dog).l After TitanPad ceased
its operation in 2017, the Bored group moved its activities to Discord, a group chat platform with
voice and video capabilities.m
The defendant (C.Y.) pleaded guilty to engaging in a child exploitation enterprisen and received a
sentence of 30 years’ imprisonment for that offence.o C.M., the leader of the child exploitation
enterprise, received a sentence of 40 years’ imprisonment.p He was killed in prison during an alter-
cation with other inmates in January 2019.q Other members of the group received sentences of
38 years (A.S.), 37 years and 6 months (O.O.), 35 years (J.N.R.), 31 years and 3 months (M.F.) and
30 years and 6 months of imprisonment (B.J.S. and D.W.).r All of the members of the group were
ordered to pay each identified victim restitution (US$ 5,000).s
For more information on this case, see UNODC, SHERLOC case law database, Case No. USAx173.t
a
The Bored group earned this nickname because the chat rooms they created all included the word “bored” in them.
b
United States of America v. Caleb Young, p. 3.
c
Ibid.
d
Ibid., p. 5.
e
Ibid., pp. 7 and 13–16.
f
Ibid., pp. 7–9.
g
United States of America v. Caleb Young, Affidavit in support of application for complaint and arrest warrant, p. 6.
h
Ibid.
i
United States of America v. Caleb Young, Sentencing Memorandum, p. 7.
j
United States of America v. Caleb Young, Plea Agreement, p. 6.
k
United States of America v. Caleb Young, Affidavit in support of application for complaint and arrest warrant, pp. 6–7.
l
United States of America v. Caleb Young, Sentencing Memorandum, pp. 10–11.
m
Ibid., p. 12.
n
United States Code, Title 18, sect. 2252A (g).
o
United States of America v. Caleb Young, Plea Agreement; United States Attorney’s Office, Eastern District of Michigan,
“Eight men sentenced for their roles in an international child pornography production ring”, press release, 6 December 2018.
p
Ibid.
q
Associated Press, “Child porn leader dies after fight at detention center”, 4 January 2019.
r
United States Attorney’s Office, Eastern District of Michigan, “Eight men sentenced”.
s
Ibid.
t
Available at https://sherloc.unodc.org/.
249
For more information, see UNODC Teaching Modules, Cybercrime, Module 2: General types of cybercrime, “Computer-
related offences” and Module 12: Interpersonal cybercrime, “Online child sexual exploitation and abuse”. Available at sherloc.unodc.
org/cld/en/education/tertiary/cybercrime/module-2/index.html and sherloc.unodc.org/cld/en/education/tertiary/cybercrime/
module-12/index.html.
250
UNODC, Study on the Effects of New Information; Greijer and Doek, Terminology Guidelines for the Protection of Children,
p. 47.
251
Canada, Nova Scotia Court of Appeal, R v. Pitts, 2016 NSCA 78.
252
Ibid., para. 10.
253
Ibid., paras. 1 and 18.
81
DIGEST OF CASES
Live-streaming child sexual abuse is prohibited by law.254 However, the criminalization of this act varies by
country. Active participants in live-streaming child sexual abuse could be charged with laws criminalizing
the production of child sexual abuse material.255 Passive participants in live-streaming child sexual abuse
could also be charged, although this depends on national laws. Passive and active participants in live-stream-
ing child sexual abuse can be charged with the possession of child sexual abuse material if they have in their
possession a recording of the session and/or pictures that were taken during the live-stream.256 Nevertheless,
the child sexual abuse that is live-streamed may not be recorded by participants, abusers and/or child hand-
ers in an effort to evade detection by law enforcement authorities and make it more difficult for them to be
prosecuted for this cybercrime. However, even in these cases, the financial transactions between partici-
pants and abusers in live-streaming child sexual abuse (e.g. online payment services, money transfers
and payments using digital currencies) can be used to detect this cybercrime and can be used in court as
evidence of this cybercrime.257 A case in point involved Xoom.com, an online money transfer service.
It reported to a well-known messaging service provider that certain users of their services were engaging in
child sexual abuse by selling child sexual abuse material and live-streaming child sexual abuse. An investi-
gation by the service provider identified multiple instances in which their account holders were believed to
be buying and selling child sexual abuse material and participating in live-streaming child sexual abuse
from the Philippines.258 This case highlights an important facet of live-streaming child sexual abuse and
child sexual abuse material. While such crimes are perpetrated primarily for the personal sexual gratifica-
tion of the offenders, the offenders also have a financial motivation for the creation and distribution of child
sexual abuse material.
United States of America v. Dylan Heatherly, No. 19-2424 (3d Circuit 2020)
and United States of America v. William Staples, No. 19-2932 (3d Circuit 2020)
(United States of America)
In Canada, an undercover investigation by a female law enforcement officer revealed that a well-
known videoconferencing platform was being used as a chat room and live-streaming space for
child sexual abuse material. The Canadian law enforcement officer reached out to her contacts in
the Government of the United States to inform them of the illicit activity that had been observed.
United States federal agents subsequently contacted the chief executive officer of the platform,
who assisted them in their investigation of the illicit activity that had been observed on the platform.
One outcome of the cooperation is the case described below, where two individuals were charged
with and convicted for their roles in the use of the videoconferencing platform to facilitate child
sexual abuse and exploitation.
254
In article 2, paragraph (e), of directive 2011/93/EU, “pornographic performance” is defined as a live exhibition aimed at an
audience, including by means of ICT, of: a child engaged in real or simulated sexually explicit conduct; or the sexual organs of a child
for primarily sexual purposes. In article 21, paragraph 1, of the Council of Europe Convention on the Protection of Children against
Sexual Exploitation and Sexual Abuse, parties to the Convention are required to criminalize: (a) recruiting a child into participating
in pornographic performances or causing a child to participate in such performances; (b) coercing a child into participating in por-
nographic performances or profiting from or otherwise exploiting a child for such purposes; and (c) knowingly attending pornographic
performances involving the participation of children. Section 4 of the Anti-Child Pornography Act of 2009 of the Philippines states
that it shall be unlawful for any person: (a) to hire, employ, use, persuade, induce or coerce a child to perform in the creation or produc-
tion of any form of child pornography; (b) to produce, direct, manufacture or create any form of child pornography; and (c) to publish
offer, transmit, sell, distribute, broadcast, advertise, promote, export or import any form of child pornography.
255
Greijer and Doek, Terminology Guidelines for the Protection of Children, p. 46.
256
Ibid.
257
Andrea Varrella, “Live streaming of child sexual abuse: background, legislative frameworks and the experience of the
Philippines”, in Online Child Sexual Exploitation: An Analysis of Emerging and Selected Issues, ECPAT International Journal,
No. 12 (2017), p. 49.
258
United States District Court, Southern District of California, United States of America v. Carsten Igor Rosenow, Case No. 17-CR-
3430, Motion to Suppress Evidence and Motion to Dismiss Indictment (2018), p. 3; and United States Attorney’s Office, Southern District
of California, “San Diego man sentenced to 25 years in federal prison for child pornography offenses”, press release, 2 March 2020.
82
chapter V. Types of cyber organized crime
The two defendants (W.S.) and (D.H.) used a videoconferencing platform as a chat room space where
they virtually met with others to view, request, receive, distribute and otherwise facilitate the receipt
and distribution of child sexual abuse material. Using the platform, pre-recorded child sexual abuse
material was shared, as well as live-streaming child sexual abuse. One male user of the platform
(A.) repeatedly live-streamed himself raping and sexually abusing his six-year-old nephew.a Other
users of the platform, including the two defendants, encouraged A. to rape and sexually abuse his
nephew. Other members of the session even directed A. to perpetrate specific types of child sexual
abuse and sexual assault on the victim (a form of “child sexual abuse to order”). The defendants also
requested child sexual abuse material from other users of the platform.
One of the defendants (W.S.) was found guilty of conspiracy to advertise, receive and/or distribute,
and aid and abet the receipt and/or distribution of, child sexual abuse material.b The other defend-
ant (D.H.) was found guilty of conspiracy to receive and/or distribute, and aid and abet the receipt
and/or distribution of, child sexual abuse material.c For their crimes, D.H. and W.S. were sentenced
to 25 and 30 years’ imprisonment, respectively.d
The two defendants appealed their convictions and sentences for conspiracy charges relating to
child sexual abuse material, claiming, among other things, that the evidence introduced in court
against them was highly prejudicial. The defendants claimed that they were not interested in child
sexual abuse material but wanted to watch other men masturbate on the platform. Child sexual
abuse video recordings and chat logs of the platform sessions and the child sexual abuse material
found on the defendants’ devices had been introduced as evidence at trial to rebuke the defendants’
claims that they were not aware and/or did not enter the chat room space for the purposes of child
sexual abuse and exploitation.
The introduction of the child sexual abuse video recordings as evidence was a particular point of con-
tention for the defendants. The introduction of the video recordings as evidence was viewed as neces-
sary to prove conspiracy to engage in child sexual abuse and child sexual exploitation by showing that
the chat room space had served as a “haven” where individuals gathered to discuss and share child
sexual abuse material.e The United States Court of Appeals for the Third Circuit held that:
The video clips helped to establish the culture that permeated the … chats. That was an impor-
tant part of proving that the participants were involved in such a unity of purpose and common
undertaking that they had necessarily entered into an agreement that this type of material be
received or distributed… The government’s attempt to verbalize what the defendants were
watching may well have been inadequate to communicate the nature of the … chats or whether
the unity of purpose between these defendants was such that it suggested an implicit agree-
ment to participate in these live-streams, as opposed to “merely” separately observing them.f
The Court of Appeals ultimately ruled that risk of the prejudicial influence of this evidence on jurors
was outweighed by the evidence being highly probative of the conspiracy and the defendants’
awareness of what they were involved in.g The Court of Appeals found no error in the defendants’
convictions and sentences and affirmed the lower court’s decisions.
For more information on these cases, see UNODC, SHERLOC case law database, Case No. USAx174.h
a
United States of America v. Dylan Heatherly, Case No. 19-2424, p. 3; and United States of America v. William Staples, Case
No. 19-2932, p. 3.
b
United States Department of Justice, Office of Public Affairs, “Two men convicted of engaging in child exploitation
conspiracy”, press release, 25 January 2018.
c
Ibid.
d
United States of America v. Dylan Heatherly, Case No. 19-2424; and United States of America v. William Staples, Case
No. 19-2932, p. 10.
e
Ibid., p. 21.
f
Ibid., pp. 7–8.
g
Ibid., p. 3.
h
Available at https://sherloc.unodc.org/.
83
DIGEST OF CASES
(a) IMGSRC.RU, a website based in the Russian Federation and dedicated to the publication of
child sexual abuse that included links to child sexual abuse material: on this site, the defendant
uploaded a photograph called “a beuty boy 3yo before to ...” from his personal email account;
(b) The Love Zone (TLZ), a platform dedicated to the exchange of child sexual abuse material
requesting its aspiring members to make an initial contribution of 50 megabytes of unpub-
lished child sexual abuse material: the defendant joined TLZ in 2013, and, after becoming a VIP
member, uploaded several images and video recordings under the computer moniker “miguel-
boysnew”. To maintain his membership, he made monthly contributions of 40 megabytes of
child sexual abuse material.
The investigation of the case was led by the division of technological crimes of the federal police of
Argentina, which preserved, analysed and produced reports based on the electronic evidence
shared by the law enforcement authorities of Australia and the United States and the electronic
evidence obtained from material seized in Argentina. The seized material, resulting from raids on
two residences in Argentina, included four electronic devices, as well as various documents, used
and unused condoms, and clothing of adults and children. A significant number of images and video
recordings indicating the production, distribution, facilitation and acquisition of child sexual abuse
material were obtained from the devices seized in the defendant’s bedroom. Images and video
recordings of activities that could be related to the recruitment of minors were also found. After
further investigation, it was established that the defendant had filmed and photographed himself
sexually abusing minors. The produced child sexual abuse material was later exchanged on the
aforementioned website and platform. Forensic data extracted from the defendant’s mobile phone
and from his tablet computer revealed a significant number of photographs of children with Anglo-
Saxon features, including a child holding a sign that read: “for my friend…”, with the defendant’s
name following the word “friend”. An analysis of metadata of the images linked some of the images
with the defendant’s mobile phone.
The defendant used the images of minors to obtain an exclusive benefit for himself, which was to
have access to more child sexual abuse material on the website and platform. The defendant
exploited minors by subjecting them to register their images in order to obtain a benefit for them-
selves, revealing the purpose of exploitation required by the type of trafficking. What the defendant
did in relation to the TLZ site is payment in kind.
The federal oral court of Jujuy sentenced the defendant to 32 years’ imprisonment for the crimes of
“trafficking in persons for the purpose of exploitation, to promote, facilitate and commercialize
child pornography” and “sexual abuse with repeated carnal access”.
For more information about this case, see UNODC, SHERLOC case law database, Case No. ARGx012.a
a
Available at https://sherloc.unodc.org/.
84
chapter V. Types of cyber organized crime
7. Trafficking in persons
Trafficking in persons refers to:
The recruitment, transportation, transfer, harbouring or receipt of persons, by means of the threat
or use of force or other forms of coercion, of abduction, of fraud, of deception, of the abuse of
power or of a position of vulnerability or of the giving or receiving of payments or benefits to
achieve the consent of a person having control over another person, for the purpose of exploitation.
Exploitation shall include, at a minimum, the exploitation of the prostitution of others or other
forms of sexual exploitation, forced labour or services, slavery or practices similar to slavery,
servitude or the removal of organs.259
ICT is used to recruit, coerce and control victims, to advertise trafficked persons, solicit clients and launder
profits, among other illicit activities.260 For example, in Belgium, an organized criminal group used ICT to
recruit victims of trafficking in persons and “employees” to work for the organization (e.g., drivers), to
advertise trafficked victims and to solicit clients.261 To recruit victims, perpetrators may use “sockpuppet”
profiles (multiple fictitious online profiles controlled by the same user to bolster some point of view) to
manipulate and deceive targets and may browse social media profiles to identify vulnerable targets. Fake
job advertisements have also been used to recruit victims and/or reach out to victims for fictitious work.262
Women and girls have been coerced to perform sex acts in front of cameras live-streaming to clients in
different parts of the world (see the box below). Traffickers have also recruited and coerced persons to
commit crimes, including cybercrimes and fraud. In one case in Denmark, trafficked persons were coerced
into committing fraud involving the use of fake digital signatories to file tax returns.263 In another case in
Denmark, trafficked persons were coerced into perpetrating credit card and other forms of fraud (see, for
example, the discussion on the Wasp Nest case in chap. VI, sect. E.3).264
Regional Trial Court of Misamis Oriental, 10th Judicial Region, Branch 41,
CRIM Case No. 2009-337 (Philippines)
The victims in this case were recruited from different areas of the Philippines and transported to
and harboured in the City of Cagayan de Oro, Philippines. Some of the victims were lured under the
pretence of working as an administrative assistant for a good salary, either in the Philippines or
overseas, while others were informed that the work involved cybersex. Irrespective of what was
discussed with victims, all of the victims worked in a cybersex den. The den, located on the third
floor of a building, included several rooms, each with a bed and a computer with a webcam and
Internet connection. The victims were required to interact with paying customers and comply with
the requests of the customers, such as undressing, dancing and/or engaging in sex acts streamed
via webcam.
The defendants took advantage of the vulnerable position of the victims and sexually exploited
them. The defendants argued that cybersex was not against the law. The court emphasized that
that did not exculpate the defendants. The defendants were charged not with facilitating cybersex,
but with the crime of trafficking in persons. The court held that evidence presented in the case
demonstrated a conspiracy between the defendants and others not charged in the case.
259
Article 3, paragraph (a), of the Protocol to Prevent, Suppress and Punish Trafficking in Persons, Especially Women and
Children, supplementing the United Nations Convention against Transnational Organized Crime.
260
See Maras, Cybercriminology.
261
Belgium, Tribunal correctionnel d’Anvers, Antwerpen, 2 mai 2016.
262
Maras, Cybercriminology.
263
Danmark B (R), ref. 9-3441/2015, domfældelse 14 December 2015.
264
Ibid.
85
DIGEST OF CASES
Regional Trial Court of Misamis Oriental, 10th Judicial Region, Branch 41,
CRIM Case No. 2009-337 (Philippines) (continued)
The defendants were charged with conspiracy and trafficking in persons in violation of sections 4 (a),
4 (e) and 6 (e) of Republic Act No. 9208. The defendants, B.S.S., E.A.S., A.G.R., A.P.B and A.L.R., were
found guilty of these crimes. Two of the defendants (B.S.S. and E.A.S., both males with Swedish
citizenship) received a sentence of life imprisonment, and each of them was required to pay a fine
of 2 million Philippine pesos. The other three defendants (A.G.R., A.P.B and A.L.R.) were sentenced
to 20 years’ imprisonment, and each of them was required to pay a fine of Pts 1 million.
For more information, see UNODC, SHERLOC case law database, Case No. PHL007.a
a
Available at https://sherloc.unodc.org/.
The advertisement of services are an essential element of trafficking in persons, as it enables the traffickers
to obtain clients for the services they are offering. Such advertisements may appear on online classified
advertisement sites, may be posted on social media platforms advertising trafficked persons (even the sale
of children) and may be in the form of individual websites dedicated to advertising trafficked victims, pros-
titution or escort services.265 In the United States, six defendants (four male and two female offenders) were
charged with and convicted for their role in trafficking two female victims, an adult and a minor, for the
purpose of sexual exploitation in two states (Maryland and Virginia) between 2018 and 2019.266 Recruitments
and advertisements of the minor victim were placed on Backpage.com shortly before it was shut down (see
the box in chap. IV), as well as YesBackpage, Bedpage and CityXGuide, which were viewed and promoted
as sites that had taken the place of Backpage once it had been taken down. The advertisements were also
available on a site that consolidates in one location escort advertisements from various sites, and an online
community forum where information and reviews of escorts are shared. A well-known messaging applica-
tion was used by the defendants to distribute images of the victims, to communicate with each other, the
clients and victims and to advertise the victims, both the minors and the adults, by sending photographs of
them to a “listserv”267 of clients. Clients visited hotels and a brothel apartment leased by one of the female
perpetrators to meet the victims. The defendants received sentences ranging from 6 years and 6 months to
16 years of imprisonment, whereby the average sentence was 15 years of imprisonment (one defendant
received a sentence of 6 years and 6 months of imprisonment).268
265
See, for example, United States of America v. Daniel Palacios Rodríguez et al. and Belgium, Tribunal correctionnel d’Anvers,
Antwerpen, 2 mai 2016.
266
United States of America v. Daniel Palacios Rodriguez et al.
A listserv distributes messages to the subscribers of a mailing list.
267
268
United States Attorney’s Office, Eastern District of Virginia, “Sex traffickers sentenced to combined 81 years in prison”, press
release, 28 July 2020.
86
chapter V. Types of cyber organized crime
their identities if they refused to engage in sexual acts with him and the co-defendant. In some
instances, these acts were filmed.
The court observed that the first defendant had a clear pattern in committing the offences and had
facilitated the interactions between the other two defendants and the complainants. The first
defendant pleaded guilty to over 20 counts of sexual assault and was eventually sentenced to
25 years’ imprisonment. The second defendant, EL, who was a police officer when he committed his
offence, pleaded guilty and was sentenced to 12 years’ imprisonment for one count of sexual
assault. The third defendant, JYN, also pleaded guilty to one count of sexual assault and was sen-
tenced to eight years’ imprisonment.
A search warrant was executed at ML’s residence, and several electronic devices (external hard
drives, pen drives, mobile phones and laptops) were seized. In addition, the police seized a number
of video recordings, dating from 2012 to 2019, of ML and the other two defendants engaging in sex
with the young girls. ML’s mobile phone was seized and examined. The analysis of texts and images
found on the phone revealed that ML, using the name “KB” and other profiles, had been in touch
with numerous girls between the ages of 12 and 15 using the application of the social media and
networking platform. From the images and texts extracted, ML’s modus operandi emerged: he
would falsely represent himself as a female model and get in touch with young girls via the social
media and networking platform and invite them to be models. He would offer them money for their
nude photographs and eventually ask them for sexual favours. When they refused, he would
threaten them with the publication of their nude photographs.
The case is a clear example of how social media platforms can enable sexual predators to target
innocent children. The court ordered that the Attorney General formally report these crimes to the
social media and networking service in question through the complaint mechanism provided for on
the service’s platform and request that any profiles used by the first defendant be removed. The
court expressed its concern and noted the challenges for law enforcement authorities, legislators,
parents, guardians, caregivers and social services in monitoring and investigating those who target
children through social media platforms. The court pointed out the need to exercise vigilance and
caution when interacting on these platforms and to report suspicious behaviour to the authorities.
The court also stressed that this case highlighted the need for specialized laws and investigating
units to respond to this type of conduct.
For more information on this case, see UNODC, SHERLOC case law database, Case No. SYCx011.a
a
Available at https://sherloc.unodc.org/.
8. Smuggling of migrants
The smuggling of migrants refers to the procurement, in order to obtain, directly or indirectly, a financial or
other material benefit, of the illegal entry of a person into a State party of which the person is not a national
or a permanent resident.269
ICT plays an integral role in the facilitation of the smuggling of migrants. ICT has been used to advertise
and finance the smuggling of migrants and has served as a tool for communication between members of the
smuggling operation and the migrants.270 Advertisements of smuggling services, fees, methods of payment,
modes of transport (e.g., by land, air or sea) and routes are posted on websites, social media platforms and
Article 3, paragraph (a), of the Protocol against the Smuggling of Migrants by Land, Sea and Air, supplementing the Organized
269
Crime Convention.
270
CTOC/COP/WG.7/2020/3, paras. 7–15; A/CONF.234/11, paras. 41–48.
87
DIGEST OF CASES
other online platforms.271 These platforms are also used to recruit migrants and other participants in the
smuggling operations (e.g., drivers). ICT also facilitates the payment of fees associated with the smuggling
of migrants. Payment can be rendered to smugglers and others involved in the smuggling operations using
traditional commercial financial transactions (e.g., cash payments and wire transfers), cryptocurrencies or
online payment and money transfer services via websites or applications.272 Moreover, communication
between smugglers and their associates, as well as between members of the smuggling operation and the
migrants, is facilitated by encrypted and unencrypted telecommunications and electronic communication
channels.273
Smuggling migrants across the border between Mexico and the United States
The leader (C.H.-M.) and two other high-ranking members (M.J.R. and S.A.S.) of a transnational
criminal organization engaged in migrant smuggling operations and based in Tecate, Mexico, were
charged with various violations of Title 8, section 1324, of the United States Code, including alien
smuggling, conspiracy to bring illegal aliens into the United States for financial gain, and conspir-
acy to transport undocumented aliens within the United States for financial gain.a The organization
had illegally smuggled migrants from Mexico through the southern border of California for a fee of
US$ 8,000 per person.b M.J.R. and S.A.S had arranged meetings at hotels and motels to obtain the
fees. Arrangements had subsequently been made to send the fees to C.H.-M. in Mexico.
ICT played an integral role in the logistics of the migrant smuggling operations. In particular, the
leader, higher-ranking members and associates of the criminal organization used a well-known
messaging application to communicate and coordinate with each other before and during smug-
gling operations.c M.J.R. and other criminal associates were responsible for recruiting drivers for
the smuggling operations. Drivers were recruited through employment advertisements on an
online classified advertisement site and other websites.d Among those recruited were secondary
school students from San Diego, California.e C.H.-M. also used ICT to monitor and track movements
of operatives and migrants, as well as to inform drivers of the pick-up locations for migrants by
using a well-known mapping and navigation application for mobile devices.f
The two higher-ranking members (M.J.R. and S.A.S.) pleaded guilty to “conspiracy to bring illegal
aliens into the United States for financial gain” and “conspiracy to transport undocumented aliens
within the United States for financial gain”, respectively. They have not been sentenced for their
crimes and the leader of the organization, C.H.-M., has not yet been tried for his crimes.
For more information on this case, see UNODC, SHERLOC case law database, Case No. USAx249.g
a
United States of America v. Cristian Hirales-Morales, Marcos Julian Romero and Sergio Anthony Santivanez, Case No. 19-CR-
4089-DMS.
b
Ibid., p. 3.
c
Ibid., pp. 3–4.
d
NBC San Diego, “Migrant smuggling ring accused of recruiting local high school students”, 17 October 2019.
e
Ibid.; Kristina Davis, “Trio charged with using high-schoolers to smuggle migrants”, The San Diego Union-Tribune,
15 October 2019.
f
United States of America v. Cristian Hirales-Morales, Marcos Julian Romero and Sergio Anthony Santivanez, p. 4.
g
Available at https://sherloc.unodc.org/.
271
Ibid.
272
CTOC/COP/WG.7/2020/3, paras. 14–15; see also A/CONF.234/11.
273
CTOC/COP/WG.7/2020/3, paras. 7–15.
88
chapter V. Types of cyber organized crime
9. Drug trafficking
Drug trafficking involves the illicit sale and distribution of drugs in violation of national laws or interna-
tional laws, such as the Single Convention on Narcotic Drugs of 1961 as amended by the 1972 Protocol, the
Convention on Psychotropic Substances of 1971 and in particular the United Nations Convention against
Illicit Traffic in Narcotic Drugs and Psychotropic Substances of 1988. Every country is affected in some
way by drug trafficking, regardless of whether it is used by drug traffickers as a source country, a transit
country or a country of destination.
In World Drug Report 2020, it was noted that the global illicit drug market had expanded, and so had the
illicit use of drugs worldwide.274 New drug trafficking patterns have also been identified.275 These patterns
include not only the types of drugs that are produced, demanded and distributed, but also the tools used (and
the manner in which they are used) in the illicit drug trade. One example of such a tool is ICT. ICT has long
been used by criminals to facilitate drug trafficking. Websites, online marketplaces, classified advertise-
ments, social media platforms and applications have been used in the advertisement, sale and purchase of
controlled drugs online.276 For example, well-known messaging, chatting and social media platform appli-
cations have been used for daily operations, price negotiation, communication, arranging deliveries and
other activities related to drug trafficking.277 ICT has also been used to evade law enforcement detection
through the use of prepaid mobile phones, encryption and the darknet.
Darknet drug markets have removed or at least reduced barriers to entry into drug markets. In United States
v. Ulbricht, the testimony of a vendor from Silk Road (a now defunct darknet market) revealed that darknet
drug markets such as Silk Road provided individuals with a platform to create a drug business irrespective
of their geographical location, by providing them with the resources they needed to sell drugs via the plat-
form: “an anonymous online sales portal, a huge pre-existing customer base, how-to advice from the
‘Seller’s Guide’ and Silk Road discussion forum, and an escrow system … to collect payment from …
customers remotely”.278 Silk Road and similar darknet sites that facilitate the illicit drug trade also made it
easier for buyers to access drugs that they might not have been able to access offline. Even drug vendors can
use other darknet vendors as drug suppliers to obtain the drugs that they sell online or offline, especially for
drugs that are not easy to obtain physically in their geographical location. The drugs that are purchased
online via the clearnet, as well as the darknet, are predominantly delivered by mail and express consignment
shipping carriers worldwide (depending on the geographical location of the buyers and sellers and the quan-
tity of the drugs).
274
World Drug Report 2020, booklet 4, Cross-Cutting Issues: Evolving Trends and New Challenges (United Nations publication,
2020), p. 9.
275
World Drug Report 2020, booklet 4.
276
European Monitoring Centre for Drugs and Drug Addiction, “The Internet and drug markets: summary of results from an
EMCDDA Trendspotter study” (2016).
277
United States of America v. Ramiro Ramirez-Barreti et al., Criminal No. 4:19-CR-47; United States District Court, Western
District of North Carolina, United States of America v. Anthony Blane Byrnes, Case No. 3:20-MJ-51, Criminal Complaint, 13 February
2020.
278
United States of America v. Ross William Ulbricht, 14-CR-68 (KBF), Government Sentencing Submission, 26 May 2015,
pp. 2–3.
89
DIGEST OF CASES
Ultimately, A.M.S. was charged with and convicted for running, organizing, supervising and direct-
ing a continuing criminal enterprise that imported and distributed controlled substances.c Along
with five other individuals (D.W.C., a male; M.A.N., a male; S.M.G., a male; A.M.T., a female; and
K.L.A.B, a female), A.M.S. engaged in drug-related offences to obtain money. All members of the
continuing criminal enterprise, with the exception of A.M.S., pleaded guilty to various drug-related
offences (e.g., conspiracy to distribute fentanyl and conspiracy to distribute alprazolam) and/or to
conspiracy to commit money-laundering charges.d A.M.S. was charged with and ultimately con-
victed by a jury for: engaging in a continuing criminal enterprise; three counts of aiding and abetting
the importation of a controlled substance; possession of a controlled substance with intent to dis-
tribute; manufacture of a controlled substance; two counts of knowing and intentional adulteration
of drugs while held for sale; aiding and abetting the use of the United States mail in furtherance of
a drug trafficking offence; conspiracy to commit money-laundering; money-laundering promotion
and concealment; and engaging in monetary transactions in property derived from specified unlaw-
ful activity.e
For his crimes, A.M.S. was sentenced to life imprisonment.f
For more information about this case, see UNODC, SHERLOC case law database, Case No. USAx208.g
a
United States Attorney’s Office, District of Utah, “Jury convicts Shamo of leading drug trafficking network”, press release,
press release, 30 August 2019.
b
United States Attorney’s Office, District of Utah, “Shamo sentenced to life in prison after conviction for organizing,
directing drug trafficking organization”, press release, 15 October 2020.
c
United States of America v. Aaron Michael Shamo, Drew Wilson Crandall, Alexandrya Marie Tonge, Katherine Lauren
Anne Bustin, Mario Anthony Noble, and Sean Michael Gygi, Case No. 2:16-CR-00631-DAK, Superseding Indictment, 31 May 2017,
pp. 2 and 8.
d
United States, Immigration and Customs Enforcement, “Utah grand jury returns superseding indictment in Shamo case;
adds distribution of fentanyl count resulting in death”, 18 October 2018.
e
United States Attorney’s Office, District of Utah, “Jury convicts Shamo of leading drug trafficking network”.
f
United States Attorney’s Office, District of Utah, “Shamo sentenced to life in prison”.
g
Available at https://sherloc.unodc.org/.
279
See UNODC, Teaching Modules, Cybercrime, Module 13. For information on global firearms trafficking, see Global Study on
Firearms Trafficking 2020 (United Nations publication, 2020).
280
For more information, see Maras, Cybercriminology, pp. 354–356; UNODC, Teaching Modules, Firearms, Module 4: the
illicit market in firearms, “Supply, demand and criminal motivations”. Available at sherloc.unodc.org/cld/en/education/tertiary/
firearms/module-4/index.html; and Giacomo Persi Paoli and others, Behind the Curtain: The Illicit Trade of Firearms, Explosives
and Ammunition on the Dark Web (Santa Monica, California; Cambridge, United Kingdom, RAND Corporation 2017).
90
chapter V. Types of cyber organized crime
used in the solicitation, advertisement and sale of firearms.281 Firearms can be advertised and sold on clearnet
sites legally or in contravention of existing laws and/or terms of service of websites. Firearms are also adver-
tised and sold on the darknet, predominantly through cryptomarkets (sites that resemble those of well-known
online sales enterprises, where many vendors can sell their goods and services) and vendor sites (where ven-
dors sell their own goods or services). For example, Ross Ulbricht, the former administrator of Silk Road, the
now defunct darknet marketplace, allowed firearms sales on Silk Road until March 2012 and then moved those
sales to a site called the Armory that had been created specifically for the advertisement and sale of firearms
(see, for example, figure II).282 Technical information and other data related to the development, assembly,
procurement and use of firearms are also shared on the clearnet and the darknet.
Figure II. Screenshot showing the page of a now defunct website created solely for the
advertisement and sale of firearms
Source: United States District Court, Southern District of New York, United States of America v. Ross William Ulbricht, Indictment
14 Cr. 68 (KBF), 7 January 2015.
281
United States, Government Accountability Office, Report to Congressional Requesters, “Internet firearm sales: ATF enforce-
ment efforts and outcomes of GAO covert testing” (November 2017).
282
United States of America v. Ross William Ulbricht, Government Sentencing Submission, p. 2.
91
DIGEST OF CASES
The defendant subdivided the platform into different thematic categories, which were intended for
exchanging information on certain topics or sales transactions. The categories and subcategories
included:
Communication on the platform mainly took place through the forums, which were accessible to
every user and only partially encrypted. In addition, users could communicate by means of the
internal messaging function for private messages, which was mandatorily encrypted using a stand-
ard encryption system. Messages older than one month were automatically deleted. The users
could also communicate via a well-known encrypted communications protocol or, in real time, via
a messaging service that required users to have a separate instant messaging application. In addi-
tion, an escrow service was offered for transactions made on the platform.
The defendant did not receive a share of the profit from the sales on the platform. The use of the
escrow service was, likewise, not based on a fee. The platform and the defendant were solely
financed by donations in bitcoin. Following an appeal for donations on 24 December 2015, the
defendant received €9,850.
The authorities were able to identify the defendant following his appeal for donations. The platform
used bitcoin as virtual currency and donations were transferred to a bitcoin address. Via a bitcoin
exchange, these donations could be transferred back to fiat currency. The bitcoins were transferred
92
chapter V. Types of cyber organized crime
back to fiat currency via “Bitcoin.de”, where the defendant used his real name and could therefore
be identified.
Between 27 September 2015 and 18 August 2016, the defendant put online at least 15 advertising
texts from users for the sale of narcotic drugs. The defendant also moved existing advertisements
and those previously released by him from the subcategory “Offer” to the subcategory “Offer veri-
fied” and marked each respective seller as a “Verified Seller”. By creating the category “Weapons”
on the forum, the defendant also supported trading transactions for weapons from 11 February
2015 until his provisional arrest in June 2017. Neither the defendant nor users of the forum had any
applicable permit to trade in narcotic drugs or weapons.
The transactions conducted via the platform included the sale of a handgun and the corresponding
ammunition by the user “rico” (later identified as P.K.) to the user “Maurächer” (later identified as
D.S.). Using the acquired weapon, D.S. carried out a mass shooting at a shopping centre on 22 July
2016, killing nine persons and severely injuring five others. In connection with the sale of the
weapon to D.S., P.K. was convicted of nine counts of negligent homicide and five counts of negligent
bodily harm and was sentenced to seven years’ imprisonment.
A.U. was charged with aiding the unlawful advertising of narcotic drugs (28 counts), aiding inten-
tional unlawful trading in a firearm (7 counts), aiding the intentional unlawful acquisition of a
semi-automatic pistol (2 counts) and intentional unlawful acquisition of narcotic drugs (4 counts).
He was also charged with aiding intentional unlawful trading in a firearm in conjunction with negli-
gent killing (9 counts) and with negligent bodily harm (5 counts) in relation to the sale of the weapon
used by D.S. to carry out the mass shooting. A.U. was sentenced to six years of imprisonment.
For more information about this case, see UNODC, SHERLOC case law database, Case No. DEUx035.a
a
Available at https://sherloc.unodc.org/.
The manufacture and distribution of firearms are regulated by law. Because firearms are manufactured and
distributed legally and illegally, the identification, tracing and investigation of illegal firearms are com-
plex.283 Like drug traffickers, firearms traffickers take advantage of ICT and social media platforms (to
advertise, sell and procure firearms) and also take advantage of mail and express consignment shipping
carriers (to deliver the firearms to buyers located anywhere in the world).284 In particular the online purchase
and subsequent postal delivery of ammunition and explosives, as well as parts and components and gun kits
for the assembly of firearms, are of growing concern. In addition, blueprints for the three-dimensional print-
ing of firearms or their parts can be downloaded on various websites, on the clearnet and on the dark web.
In most countries, there are legal loopholes in and limitations to the criminalization of the possession,
downloading or distribution of such blueprints.
283
See also UNODC Teaching Modules, Organized Crime, Module 3: organized crime markets, “Firearms trafficking”. Available
at sherloc.unodc.org/cld/en/education/tertiary/organized-crime/module-3/index.html.
284
Maras, Cybercriminology, pp. 354–356.
93
DIGEST OF CASES
Although the serious threats posed by wildlife crime are increasingly being recognized, there is no univer-
sally accepted definition of wildlife crime, nor are there international instruments that attempt to propound
such a definition.285 For the purposes of this publication, however, wildlife crime refers to trafficking in
specimens of wild flora and fauna, as well as related offences, contrary to national law, including but not
limited to national laws implementing obligations under the Convention on International Trade in
Endangered Species of Wild Fauna and Flora.286
Wildlife crime has become a significant and specialized area of transnational organized crime.287 Like other
traffickers, wildlife traffickers use ICT to enhance their operations and facilitate the advertisement, sale and
distribution of wildlife to customers throughout the world. Online trade in wildlife and wildlife products is
growing,288 a fact that has been recognized with concern by the General Assembly.289
While online marketplaces continue to be the most popular platforms for online wildlife trade, wildlife trade
is increasingly occurring on social media platforms.290 The growing trend in trafficking taking place through
social media and messaging applications has been observed in relation to a number of species, including
species of reptiles and big cats.291 One study of illicit marketplaces operating in the United Kingdom found
1,194 advertisements selling 2,456 specimens of wildlife at prices totalling almost US$ 1 million.292 In some
countries, wildlife traffickers have been reported to prefer online sales to physical markets as they entail
lower overhead costs and less scrutiny from authorities.293 Traffickers change usernames and use technolo-
gies such as virtual private networks to avoid apprehension.294 When online sales points are detected by law
enforcement authorities, the traffickers simply move to different online platforms.295
United States of America v. Eoin Ling Churn Yeng and Gal Vin Yeo Siang Ann, Case
No. 3:16 CR 00090 (D. Oregon, 23 February 2016) (United States of America)
The defendants, E.L.C.Y. and G.Y.S.A., operated Borneo Artifact, a company based in Malaysia.
Borneo Artifact illegally sold wildlife and wildlife products (orangutan skulls, rhinoceros hornbill
heads, helmeted hornbill skulls, etc.) via its website (borneoartifact.com) and an online auction
site. The defendants conspired with others to illegally ship and import wildlife and wildlife products
into the United States, concealing the true nature of the merchandise by purposely mislabelling the
shipments (as “crafts for decoration”, for example).
During the investigation of the enterprise, one of the defendants, E.L.C.Y., communicated via email
with an individual who, unbeknown to E.L.C.Y., was an undercover special agent from the United
States Fish and Wildlife Service of the Department of the Interior. The special agent was posing as
an associate of E.L.C.Y. who, following an investigation into his activities, had agreed to act as a
confidential informant and allowed the agent to use his email.a In his email messages sent to the
special agent, E.L.C.Y. revealed the types of illicit wildlife and/or wildlife products that were for sale,
the manner in which the merchandise would be transported to the United States, connections the
defendants had in the countries from which the products would be shipped and the ways in which
detection by border and custom agencies would be evaded.
285
See also World Wildlife Crime Report 2020: Trafficking in Protected Species (United Nations publication, 2020), p. 29.
286
See also UNODC, Guide on Drafting Legislation to Combat Wildlife Crime (2018), p. 2.
287
World Wildlife Crime Report 2020, p. 109.
288
Ibid., p. 13.
289
See, for example, General Assembly resolution 71/326.
290
International Fund for Animal Welfare, “Disrupt: wildlife cybercrime” (London, 2018), p. 30.
291
World Wildlife Crime Report 2020, pp. 13, 15 and 87.
292
International Fund for Animal Welfare, “Disrupt”.
293
World Wildlife Crime Report 2020, p. 76.
294
Coalition to End Wildlife Trafficking Online, “Offline and in the wild: a progress report of the Coalition to End Wildlife
Trafficking Online” (2020), p. 3.
295
World Wildlife Crime Report 2020, p. 76.
94
chapter V. Types of cyber organized crime
The defendants ultimately pleaded guilty to conspiracy to smuggle goods into the United States,
receiving six months’ imprisonment, a fine of US$ 25,000, and 240 hours of community service to be
completed during their one year of supervised release from prison.b
For more information on this case, see UNODC, SHERLOC case law database, Case No. USAx200.c
a
United States District Court, District of Oregon, United States of America v. Eoin Ling Churn Yeng and Gal Vin Yeo Siang Ann,
Case No. 15-MJ-173, Criminal Complaint 1 December 2015); United States of America v. Eoin Ling Churn Yeng and Gal Vin Yeo
Siang Ann, Case No. 3:16 CR 00090, Criminal Indictment, 23 February 2016.
b
United States Attorney’s Office, District of Oregon, “Two Malaysian men sentenced to federal prison for smuggling
endangered wildlife into U.S.”, press release, 27 April 2016.
c
Available at https://sherloc.unodc.org/.
296
See also International Guidelines for Crime Prevention and Criminal Justice Responses with Respect to Trafficking in Cultural
Property and Other Related Offences (General Assembly resolution 69/196, annex).
297
Ibid.
298
See, for example, General Assembly resolutions 66/180, 69/196, annex, and 73/130.
United Nations Educational, Scientific and Cultural Organization (UNESCO), International Standards Section, Division of
299
Cultural Heritage, “Legal and practical measures against illicit trafficking in cultural property: UNESCO handbook” (Paris, 2006), p. 4.
300
UNODC, Practical Assistance Tool to Assist in the Implementation of the International Guidelines for Crime Prevention and
Criminal Justice Responses with Respect to Trafficking in Cultural Property and Other Related Offences (Vienna, 2016).
301
See also UNESCO, International Criminal Police Organization (INTERPOL) and International Council of Museums, “Basic
actions concerning cultural objects being offered for sale over the Internet” (2006).
95
DIGEST OF CASES
organized criminal groups in all forms and aspects of trafficking in cultural property and related offences,
has noted that illicitly trafficked cultural property is increasingly being sold through all kinds of markets, in
particular over the Internet.302
Organized criminal groups have engaged in the trafficking in cultural property through legitimate markets
online and credible auction sites, as well as through underground illicit markets. Since the late 2000s, social
media and communication applications have also been used for trafficking in cultural property.303 The shift
to online trade has expanded the potential customer base for traffickers, has created new markets for small,
inexpensive objects such as coins that previously would not have been profitable to trade and has provided
traffickers with opportunities to sell cultural property and receive payment without being detected.304 These
trends have led to a rise in the number of dealers in trafficked cultural property.305
United States of America v. Ijaz Khan, Case No. 17-4301 (4th Circuit 2018)
(United States of America)
The defendant (I.K.) was convicted by a jury for crimes that included the smuggling of goods into the
United Statesa (the smuggling of stolen cultural artefacts (e.g., coins, pottery, arrowheads and
bronze weapons) from Pakistan into the United States) and conspiracy.b The defendant had submit-
ted fraudulent documents, purportedly from the Government of Pakistan, authorizing his export of
the cultural artefacts and certifying the value of the objects. The defendant used his company, Indus
Valley, to sell the stolen cultural artefacts to his existing customer base, in person (at shows) and
online (on websites and auction sites).c
The defendant was identified as the leader and organizer of an organized criminal group made up of
his family members (his wife and sons) and others who were not related to the defendant (e.g., J.B.M.).
He played a central role in the planning and operations and in the recruitment of accomplices, and he
controlled and exercised authority over others in the group. Because of his central leadership role, he
received a sentencing enhancement, which he unsuccessfully appealed. The defendant pleaded guilty
and was sentenced to three years’ imprisonment and was required to pay a fine of approximately
US$ 115,000 and to forfeit more than 1,300 cultural artefacts.d The defendant unsuccessfully appealed
his conviction and sentence to the United States Court of Appeals for the Fourth Circuit.
Others in the organized criminal group pleaded guilty and were also sentenced for their roles in the
conspiracy to commit smuggling. For example, V.L. (the defendant’s wife) and J.B.M. received sen-
tences of four months of imprisonment (and two years of supervised release from prison) and two
years of probation, respectively.e
For more information on this case, see UNODC, SHERLOC case law database, Case No. USAx209.f
a
The offence of “smuggling goods into the United States” is included in Title18, section 545, of the United States Code.
b
United States Court of Appeals, Fourth Circuit, United States of America v. Ijaz Khan, Case No. 17-4301 (4th Circuit 2018).
c
United States Attorney’s Office, Eastern District of Virginia, “Three indicted for smuggling artifacts into U.S. and
citizenship fraud”, press release, 27 May 2016; United States District Court, Eastern District of Virginia, United States of America
v. Assorted Artifacts, Civil Action No. 1:16cv1393, 21 February 2017.
d
United States Attorney’s Office, Eastern District of Virginia, “Man sentenced for smuggling artifacts from Pakistan into
United States”, press release, 5 May 2017.
e
Pahedra Haywood, “Santa Fe duo sentenced in immigration fraud, artifacts-smuggling case”, The New Mexican, 5 May 2017;
Matt Zapotosky, “Probation for dealer who smuggled artifacts from grave sites in Pakistan”, The Washington Post, 26 January 2016.
f
Available at https://sherloc.unodc.org/.
302
See General Assembly resolutions 66/180 and 69/196.
303
Neil Brodie and Donna Yates, Illicit Trade in Cultural Goods in Europe: Characteristics, Criminal Justice Responses and an
Analysis of the Applicability of Technologies in the Combat against the Trade–Final Report (Luxembourg, Publications Office of the
European Union, 2019), p. 106; United Nations Educational, Scientific and Cultural Organization, Fourth Session of the Subsidiary
Committee of the Meeting of States Parties to the Convention on the Means of Prohibiting and Preventing the Illicit Import, Export
and Transfer of Ownership of Cultural Property, document C70/16/4.SC/10, paras. 20–22.
304
Brodie and Yates, Illicit Trade in Cultural Goods in Europe, p. 106.
305
Ibid.
96
chapter V. Types of cyber organized crime
Authorities investigating trafficking in cultural property online face a number of challenges, including the
variety of platforms on which cultural property is trafficked online, missing information hindering proper
identification of items, and difficulties identifying vendors. To avoid detection, traffickers of cultural prop-
erty operating online have used hacker techniques such as IP address spoofing (i.e., replacing the source
IP address with a fake one).306
13. Money-laundering
Money-laundering can be described as the process whereby criminals conceal and legitimate illicit funds.307
To accomplish this, criminals take the proceeds of a crime and transform them into what appears to be
legally obtained funds. Money-laundering enables criminals to keep and use the proceeds of their crimes
and to conceal the predicate offences that enabled them to obtain those proceeds. In article 6 of the Organized
Crime Convention, States parties to the Convention are required to criminalize four types of offences related
to money-laundering:
(a) The conversion or transfer of property, knowing that such property is the proceeds of crime;308
(b) The concealment or disguise of the true nature, source, location, disposition, movement or own-
ership of or rights with respect to property, knowing that such property is the proceeds of crime;
(c) The acquisition, possession or use of property, knowing that such property is the proceeds of
crime;
(d) Participation in, association with or conspiracy to commit, attempts to commit and aiding, abet-
ting, facilitating and counselling the commission of any of the offences established in accordance with
article 6 of the Convention.
The defendants were all charged with money-laundering. In order to prove the offence of money-
laundering, the prosecution had to prove that the accused person engaged, directly or indirectly, in
a transaction that involved proceeds of crime (in this case, stolen money) and that the accused
knew, or ought to have known, that the money was derived or realized, directly or indirectly, from
some form of unlawful activity. In Fiji, the offence of money-laundering is not predicated on proof of
the commission of the offence from which the proceeds derived, thereby facilitating convictions of
organized criminal groups.
Ultimately, the court found all of the defendants guilty of money-laundering.a On 18 September
2018, the court sentenced the defendants R.R.N., A.R.D. and R.R. to six years and nine months of
imprisonment, three years of imprisonment and five years of imprisonment, respectively. In addi-
tion, R.R.N. was ordered to pay a restitution of 12,000 Fiji dollars to the bank.
306
European Commission, Commission staff working document: impact assessment accompanying the document proposal for
a regulation of the European Parliament and of the Council on the import of cultural goods, document SWD(2017) 262 final, p. 15.
307
Maras, Cybercriminology, p. 336.
308
In article 2, paragraph (e), of the Organized Crime Convention, “proceeds of crime” is defined as “any property derived from
or obtained, directly or indirectly, through the commission of an offence”.
97
DIGEST OF CASES
The defendant, R.R., filed a notice of appeal against her conviction and sentence and applied for bail
pending appeal. Both the leave to appeal and the application for bail pending appeal were refused by
the court. The defendant, R.R.N., filed a notice for appeal against his conviction and sentence, arguing
that his sentence was manifestly harsh and excessive and wrong in principle, and applied for bail
pending appeal. While the Court of Appeal of Fiji noted that the defendant had not substantiated why
his sentence was harsh and excessive, it reiterated what the trial court had said – that the tariff for the
offence of money-laundering was not well settled in Fiji. The Court of Appeal further noted that, at
that stage, it was not able to tell if the sentencing tariff of 5–12 years set by the trial judge was widely
accepted and implemented among all trial courts in Fiji. The court held that the issue of sentencing
tariffs should thus be taken on by the Court of Appeal or the Supreme Court to guarantee uniformity.
The Court of Appeal found that, since it was a question of law, no leave for appeal was required, but it
allowed for leave to appeal against the sentence as a matter of formality. However, the Court of Appeal
also noted that none of the grounds of appeal had any reasonable prospect of success at that stage.
The Court of Appeal refused the application filed by R.R.N. for bail pending appeal and leave for
appeal against the conviction but allowed leave for appeal against the sentence. Appeal proceedings
have not yet taken place.
This case is of great significance, since it is one of only a few judgments in the region involving cyber-
crime. At the time of the investigation, the authorities of Fiji had only limited experience with cyber-
crime and no direct evidence proving that the proceeds of crime were derived from cybercrime was
provided to the court. The defendants could, nonetheless, be convicted of money-laundering since, in
Fiji, the offence of money-laundering is not predicated on proof of the commission of the offence from
which the proceeds derived. The trial court was therefore able to rely on circumstantial evidence
when convicting the members of the organized criminal group.
For more information, see UNODC, SHERLOC case law database, Case No. FJIx008.b
a
Fiji, Proceeds of Crime Act 1997, as amended by the Proceeds of Crime (Amendment) Act 2004, sect. 69, paras. (2) (a) and
(3) (a).
b
Available at https://sherloc.unodc.org/.
The money-laundering process consists of three stages: placement, layering and integration. During the
placement stage, the illicitly obtained money is distributed into the financial system (e.g., through the pur-
chasing of assets or currency exchanges). The next stage, layering, includes multiple activities that seek to
further distance the proceeds of the crime from their original source, making it more difficult to uncover
money laundering. More specifically, once the proceeds of the crime have been placed into the financial
system, they are moved to other financial institutions or converted from one type of asset to another in order
to further distance the proceeds of the crime from their illicit origin. Finally, the proceeds of the crime are
introduced back into the economy. At this stage of money laundering, integration, the proceeds of the crime
appear to be legitimate and are used by criminals to buy property and/or acquire other assets.
98
chapter V. Types of cyber organized crime
United States of America v. Tal Prihar and Michael Phan, Case No. 2-19-CR-00115-
DWA (W.D. Pennsylvania, 24 April 2019) (DeepDotWeb) (United States of
America)
The defendants (T.P. and M.P.) owned and operated a clearnet website, the DeepDotWeb, which
offered direct hyperlinks to onion addresses for darknet marketplaces, making it easier for poten-
tial customers to access those marketplaces. Darknet marketplaces offer illicit drugs and fire-
arms, stolen data, malware and hacking tools, stolen and counterfeit identity documents and
unauthorized access to compromised or hacked accounts, among other illicit goods and services.
DeepDotWeb provided links for the following (now defunct) darknet marketplaces: AlphaBay
Market, Agora Market, Abraxas Market, Dream Market, Valhalla Market, Hansa Market, TradeRoute
Market, Dr. D’s, Wall Street Market and Tocha Market.a
Each time a user utilized the link to the darknet marketplace provided by DeepDotWeb and made a
purchase on the darknet market, DeepDotWeb would receive a kickback. Specifically, the darknet
marketplace links provided by DeepDotWeb included unique account identifier that enabled the
individual marketplaces to pay DeepDotWeb so-called “referral bonuses” (i.e., a percentage of the
profits).b The defendants received an estimated US$ 8,414,173 in bitcoin as “referral bonuses”,
which was transferred to the bitcoin wallet of DeepDotWeb.c The defendants engaged in more than
2,700 transactions to withdraw the cryptocurrency.d To hide the proceeds of their crimes, the
defendants created numerous shell companies in various countries and opened up numerous
virtual and other financial accounts (i.e., an online payment service account and several bank
accounts in Georgia, Israel and Latvia).e
Both defendants were charged with conspiracy to commit money-laundering. T.P. pleaded guilty to
conspiracy to commit money-laundering and was sentenced to 97 months’ imprisonment.f Among
other things, P.T. had to forfeit US$ 8,414,173.g M.P., his co-defendant, was arrested and detained in
Israel. The United States has requested his extradition from Israel. M.P. has not yet been extradited
from Israel.
For more information, see UNODC, SHERLOC case law database, Case No. USAx236.h
a
United States District Court, Western District of Pennsylvania, United States of America v. Tal Prihar and Michael Phan,
Case No. 2-19-CR-00115-DWA, Indictment, 24 April 2019, p. 5.
b
Ibid., p. 4.
c
Ibid., p. 8.
d
Ibid.
e
Ibid., pp. 10-12.
f
United States, Department of Justice, Office of Public Affairs, “DeepDotWeb administrator sentenced for money-
laundering scheme”, 26 January 2022.
g
United States District Court, Western District of Pennsylvania, United States of America v. Tal Prihar and Michael Phan,
Case No. 2-19-CR-00115-DWA, Judgment, 25 January 2022.
h
Available at https://sherloc.unodc.org/.
The mechanisms (e.g., people, financial and non-financial institutions, such as banks, wire transfer compa-
nies, currency exchanges and casinos) and instruments (e.g., securities or wire transfers) used in money
laundering vary. For instance, in the GozNym malware case, the offenders stole money from victims’ bank
accounts and laundered those funds using United States and foreign beneficiary bank accounts controlled
by the defendants;309 in contrast, the Bayrob criminal enterprise, and criminals in other cases included in
this digest, used money mules to do the money laundering.310
See, for example, United States of America v. Bogdan Nicolescu, Tiberiu Danet and Radu Miclau (Bayrob); and United States
310
99
DIGEST OF CASES
The Alexandria Online Auction Fraud Network worked with others to launder criminal proceeds, by
taking the money paid by victims for the fake items sold online, converting the money to bitcoin,
transferring the bitcoin to members and associates in Eastern Europe and using bitcoin exchanges
to convert the bitcoin to fiat currency.d Associates of the organizations in the United States, such as
J.A.V., obtained victims’ payments, converted them to bitcoins and sent the bitcoins to members of
the organization who had perpetrated the online auction fraud.e Third parties in the United States
who participated in money-laundering (A.E.N., D.A.B. and R.W.D.L.T) were also used to collect,
redeem and convert victims’ payments into cash or bitcoins.f In addition, two bitcoin exchangers
were used by the Alexandria Online Auction Fraud Network. R.I., a national of Bulgaria and owner
of the Bulgarian bitcoin exchange RG Coins, was charged with and convicted of conspiracy to
commit racketeering and conspiracy to commit money-laundering in contravention of United States
laws.g V.-C.N., a national of Romania and owner of a bitcoin exchange (Coinflux Services SRL) reg-
istered in Romania, pleaded guilty to conspiracy to commit racketeering.h
Of the 20 individuals charged in the United States, 16 were foreign nationals. Twelve of the foreign
nationals have been extradited to the United States.i To date, 17 individuals have been convicted for
crimes relating to the online auction fraud perpetrated by members and associates of the criminal
organization, including conspiracy to commit racketeering, money-laundering, wire fraud and iden-
tity-related fraud.j
For more information see, see UNODC, SHERLOC case law database, Case No. USAx175.k
a
United States of America v. Andre-Catalin Stoica et al., p. 3; United States of America v. Beniamin-Filip Ologeanu; United States
Attorney’s Office, Eastern District of Kentucky, “United States v. Andrei Catalin Stoica, et al. (5:18-CR-81-JMH) and United
States v. Beniamin-Filip Ologeanu, et al. (0:19-CR-10-JMH)”, updated 20 July 2020.
b
United States of America v. Andre-Catalin Stoica et al., p. 3.
c
Ibid., p. 4.
d
Ibid., pp. 3–4.
e
United States District Court, Eastern District of Kentucky, United States of America v. Joshua Aaron Vallance, Case No. 20
CR. 08, 28 May 2020), p. 3.
f
United States of America v. Beniamin-Filip Ologeanu et al., Superseding Indictment, p. 6.
g
United States of America v. Andre-Catalin Stoica et al., pp. 9–10; United States Department of Justice, Office of Public
Affairs, “Owner of bitcoin exchange convicted of racketeering conspiracy for laundering millions of dollars in international cyber
fraud scheme”, press release, 28 September 2020.
h
United States of America v. Andre-Catalin Stoica et al., p. 9.; United States Department of Justice, Office of Public Affairs,
“Fifteen defendants plead guilty to racketeering conspiracy in international cyber fraud scheme”, press release, 11 June 2020.
i
United States Department of Justice, Office of Public Affairs, “United States and international law enforcement dismantle
online organized crime ring operating out of Romania that victimized thousands of U.S. residents”, press release, 7 February
2019.
j
United States Department of Justice, Office of Public Affairs, “Owner of bitcoin exchange convicted of racketeering
conspiracy”; “United States and international law enforcement dismantle online organized crime ring”; United States District
Court, Eastern District of Kentucky, United States v. Alexandru Ion, Case No. 5:18-CR-81-REW-MAS-6, 10 October 2019; United
States Attorney’s Office, Eastern District of Kentucky, “Fifteen defendants plead guilty to racketeering”; United States of America
v. Beniamin-Filip Ologeanu et al.; United States of America v. Andre-Catalin Stoica et al.; United States Department of Justice, Office
of Public Affairs, “United States and international law enforcement dismantle online organized crime ring”.
k
Available at https://sherloc.unodc.org/.
100
chapter V. Types of cyber organized crime
Money laundering can also be done through unlicensed money transmitters, which do not comply with laws
and internationally recognized standards for countering money laundering. Unlicensed money transmitters
have enabled individuals to transfer funds without providing and proving their identities. A case in point is
e-Gold, an unlicensed and unregistered money transfer business that operated in contravention of money laun-
dering laws and regulations, thereby enabling criminals to use it to anonymously expand and profit from their
illicit activities.311 In particular, e-Gold provided their services (i.e., transferable gold-denominated accounts)
via two websites, where users could register and use the platforms to buy, transfer and exchange digital cur-
rency backed by precious metals, known as units of e-gold, without validating their identity. Ultimately,
e-Gold and its corporate affiliate pleaded guilty to conspiracy to engage in money laundering and conspiracy
to operate an unlicensed money transmitting business.312
The Financial Crimes Enforcement Network of the United States Department of the Treasury iden-
tified Helix transactions on, inter alia, the following (now defunct) darknet marketplaces: Abraxas,
Agora, AlphaBay, Aviato, Black Bank, Doctor D, Dream, DutchDrugz, Evolution, Flugsvamp Market
2.0, Hansa, Hydra, Joker’s Stash, Middle Earth, Nucleus, Oasis, Russian Anonymous, Silk Road 2,
TradeRoute, Unic, Valhalla (Silkkitie) and Wall Street Market.e Numerous Helix transactions were
also identified on Welcome to Video, a child sexual exploitation site on the darknet (see chap. IV).
Helix also conducted bitcoin transactions with BTC-e, a now defunct illegal money transmitter
offering virtual currencies. BTC-e, like Helix, was used by criminals because the users’ identities
did not need to be verified to trade cryptocurrency.f
Pursuant to the United States Bank Secrecy Act of 1970, suspicious activity reports need to be filed by
money services businesses, such as money transmitters. The Financial Crimes Enforcement Network
considers businesses that exchange and administer cryptocurrencies and/or provide mixing or tum-
bling services to be money transmitters under the Bank Secrecy Act.g The Network reported that
suspicious activity reports were not filed for Helix transactions on the aforementioned darknet mar-
kets. Ultimately, the court found that Helix had operated as an unlicensed money transmitting busi-
ness.h L.D.H. received a civil money penalty of US$ 60 million from the Financial Crimes Enforcement
Network for violating the Bank Secrecy Act.i
311
United States District Court, District of Columbia, United States of America v. E-Gold Limited, Criminal Action No. 07-109
(RMC), 20 July 2007.
312
United States, Department of Justice, “Digital currency business E-Gold pleads guilty to money laundering and illegal money
transmitting charges”, press release, 21 July 2008.
101
DIGEST OF CASES
United States of America v. Larry Dean Harmon, Case No. 19-CR-00395 (D.D.C. 2019)
(Helix and Grams) (United States of America) (continued)
On August 18, 2021, L.D.H. pleaded guilty to conspiracy to commit money-laundering.j
For more information on this case, see UNODC, SHERLOC case law database, Case No. USAx237.k
a
United States, Financial Crimes Enforcement Network, Department of Treasury, “In the matter of Larry Dean Harmon:
assessment of civil money penalty”, No. 2020-2, Attachment A: Statement of Facts.
b
Ibid.
c
United States District Court, District of Columbia, United States of America v. Larry Dean Harmon, Case No. 19-CR-395
(BAH), Statement of the Offense and Related Conduct, 10 August 2021.
d
United States of America, Financial Crimes Enforcement Network, Department of Treasury, “In the matter of Larry Dean
Harmon”.
e
Ibid., pp. 7–11.
f
United States Attorney’s Office, Northern District of California, “Russian national and bitcoin exchange charged in
21-count indictment for operating alleged international money-laundering scheme and allegedly laundering funds from hack
of Mt. Gox”, 26 July 2017.
g
See United States, Financial Crimes Enforcement Network, “Guidance: application of FinCEN’s regulations to persons
administering, exchanging, or using virtual currencies, FIN-2013-G001, 18 March 2013, and Guidance: application of FinCEN’s
regulations to certain business models involving convertible virtual currencies, FIN-2019-G001, 9 May 2019[[LINK]], cited in
Financial Crimes Enforcement Network, Office of Strategic Communications, “First bitcoin ‘Mixer’ penalized by FinCEN for
violating anti-money-laundering laws”, No. 703-905-3770, 19 October 2020.
h
United States District Court for the District of Columbia, United States v. Larry Dean Harmon, 474 F. Supp. 3d 76 (D.D.C. 2020).
i
United States of America, Financial Crimes Enforcement Network, Department of Treasury, “In the matter of Larry Dean
Harmon: assessment of civil money penalty”, No. 2020-2, p. 7. [[LINK]]
j
United States Attorney’s Office, District of Columbia, “Ohio resident pleads guilty to operating darknet-based bitcoin
‘Mixer’ that laundered over $300 million”, 18 August 2021.
k
Available at https://sherloc.unodc.org/.
313
See, for example, the government websites in countries that include information about Internet gambling licences. In the United
States, casinos in New Jersey have been given licences. The licences enable them to offer Internet gambling services in the State of
New Jersey (United States, State of New Jersey, Division of Gaming Enforcement, “Internet gaming sites”. Available at www.nj.gov/
oag/ge/gamingsites.html).
“Because of the lack of direct contact between consumer and operator, games of chance accessible via the internet involve different
314
and more substantial risks of fraud by operators compared with the traditional market for such games” (Court of Justice of the European
Union, Sporting Exchange Ltd v. Minister van Justitie, Case No. C-203/08, Judgment, 3 June 2010, para. 34). See also Masood Zangeneh,
Mark Griffiths and Jonathan Parke, “The marketing of gambling”, in In the Pursuit of Winning: Problem Gambling Theory, Research and
Treatment, Masood Zangeneh, Alex Blaszczynski and Nigel Turner, eds. (New York, Springer, 2008), pp. 135–15); John L. McMullan
and David Perrier, “The security of gambling and gambling with security: hacking, law enforcement and public policy”, International
Gambling Studies, vol. 7, No. 1 (2007), pp. 43–58; Sangeeta Ranade, Stuart Bailey and Alexandra Harvey, “A literature review and survey
of statistical sources on remote gambling” (October 2006); UNODC, Comprehensive Study on Cybercrime, draft, p. 21.
102
chapter V. Types of cyber organized crime
Internet gambling is not universally criminalized at the national level. The type of gambling that is considered
illegal also varies from country to country.315 Because of the variation in laws, companies and criminal organ-
izations can house their servers and conduct their operations in multiple jurisdictions where Internet gambling
is legal. Organizations and criminal groups offering Internet gambling can have their operations located
in various countries – they can have the headquarters of their company in one country, servers in one or more
countries and support centres in different countries, depending on the regulations of each country on
Internet gambling and taxation, which vary between countries. Some countries support Internet gambling as
long as it occurs in accordance with existing laws and meets licensing, regulatory and taxation requirements.316
Other countries allow Internet gambling under certain circumstances in accordance with national law and
restrict and control and limit Internet gambling operations.317 In other countries, Internet gambling is strictly
prohibited.318
The Government seized various technological devices (cell phones, laptops, notebook computers,
handheld game consoles, SIM cards etc.) and accessories (e.g. headphones, speakers and key-
boards), Argentine pesos, United States dollars, vehicles and clothing and accessories with printed
logos and advertisements and other items related to the operation and its activities.
Three defendants, R.D.M., I.M.C. and L.M.P., each received a sentence of three years’ imprisonment
and a fine of Arg$ 45,000. The other defendant, P.D.S., received a three-year suspended sentence
and a fine of Arg$ 30,000.
For more information about this case, see UNODC, SHERLOC case law database, Case No. ARGx018.a
a
Available at https://sherloc.unodc.org/.
315
For example, in the United States, betting on horse racing is considered legal (with few exceptions), whereas sports betting was
considered illegal in many states until 2018, when the Supreme Court struck down a federal law prohibiting sports gambling at the
state level (see Murphy, Governor of New Jersey, et al. v. National Collegiate Athletic Association, No. 16-476, 584 U.S. ___ (2018),
138 S. Ct. 1461). The Wire Act of 1961, a United States federal law, is currently being interpreted as applying to interstate sports
gambling and interstate Internet sports gambling.
316
See, for example, United Kingdom, Gambling Act of 2005.
317
See, for example, Ordinance 30 of 1960 of Singapore and its subsequent revisions (i.e., the Betting Act) and the Remote
Gambling Act of 2015.
318
See, for example, the Common Gaming Houses Act of Brunei Darussalam, which prohibits all forms of gambling, and
article 17 of the Federal Decree-Law No. 5 of 2012 of the United Arab Emirates, which prohibits Internet gambling.
103
DIGEST OF CASES
Cassazione penale, sezione VI, sentenza No. 11356, 8 Novembre 2017 (Italy)
This case concerns the involvement of a mafia-type group, the Clan of Casalesi, in illegal online
gambling. The Clan of Casalesi emerged decades prior to the instant case in the province of
Caserta in the region of Campania, in the south of Italy. After emerging in Caserta, the Clan of
Casalesi progressively established its control in the region of Campania. The group subsequently
expanded its activities into other regions of Italy, including the region of Emilia-Romagna, in the
north of Italy.
The modus operandi used by the Clan of Casalesi for their illicit activities relating to online gam-
bling in the region of Emilia-Romagna differed from the modus operandi used in the region of
Campania. In Campania, the main group of the Clan offered protection to entrepreneurs working in
the gambling industry. In exchange for a monthly fee, the main group, through intimidation and
violence, imposed on local businesses the services and products of the protected entrepreneurs,
fending off the competition. In Emilia-Romagna, where the main group had recently expanded its
influence, a relatively autonomous branch of the Clan used a different method. Rather than offering
protection to the entrepreneurs in the region, the Emilia-Romagna branch used a formally legiti-
mate enterprise as a front for their activities, opening betting points at which unauthorized slot
machines were installed and online links to illegal gambling websites were made available to cli-
ents. The illegal gambling business allowed the branch to make profits while avoiding the payment
of taxes and made possible the money-laundering of the criminal group’s proceeds derived from
other activities.
The judgment of the Supreme Court of Cassation in this case dealt with the defendants who opted
for shortened judicial proceedings. The issue in this case concerned the application of criminal
association offences – both the “simple” criminal association offence and the mafia-type associa-
tion offence – to a mafia-type group consisting of: (a) the main group operating in the region of
Campania, which adopted intimidation, submission and silence as its modus operandi (the mafia
method); and (b) the Emilia-Romagna branch, which did not adopt the mafia method. The Court was
required to determine the correct application of the criminal association offence and the mafia-type
offence in relation to the participants of the two units of the mafia-type group.
The prosecutor charged the members who had participated in the main group and the Emilia-
Romagna branch with the mafia-type association offence and with the criminal association
offence, whereas those who had participated only in the Emilia-Romagna branch were charged
with only the criminal association offence. In the opinion of both the court of first instance and the
Court of Appeal of Naples, the presence of the relatively autonomous Emilia-Romagna branch,
which had adopted a modus operandi that differed from that of the main group, required the
application of two different criminal association offences, the mafia-type association offence
being applicable to the main group and the criminal association offence being applicable to the
Emilia-Romagna branch. The courts rejected the choice made by the prosecutor in the indict-
ment (i.e., charging those members who had participated in both the main group and the Emilia-
Romagna branch with two different criminal association offences) on the grounds that that
constituted double jeopardy. This finding was supported by the court’s conclusion that the main
group and the Emilia-Romagna branch were not distinct criminal groups but rather a single
criminal group sharing the same aims, notwithstanding the fact that the Emilia-Romagna branch
exercised relative autonomy. Accordingly, to convict the defendants for membership of both the
main group and the subgroup would be to convict them twice for the same offence. The proper
approach was for the defendants that had participated in both the main group and the Emilia-
Romagna branch to face punishment only for their participation in the main group (i.e., punish-
ment for the mafia-type association offence).
104
chapter V. Types of cyber organized crime
Following the decision of the Court of Appeal of Naples, those members who had participated only
in the Emilia-Romagna branch appealed to the Supreme Court of Cassation seeking an acquittal for
their convictions for the criminal association offence. For almost every defendant, the Supreme
Court of Cassation upheld the decision of the Court of Appeal of Naples, which largely confirmed
the findings of guilt. In particular, the Court rejected the appeals of those defendants who had par-
ticipated only in the Emilia-Romagna branch and stated, in line with the ruling of the Court of
Appeal of Naples, that it was necessary to bring charges of both the criminal association offence
and the mafia-type association offence against different defendants, even if all defendants were
part of the same larger criminal group. This was because, first, the Emilia-Romagna branch showed
some degree of autonomy and, secondly, the Emilia-Romagna branch did not have the same modus
operandi – that is, the pattern of violence and intimidation – of the main group. Moreover, the
Supreme Court of Cassation agreed with the decision of the Court of Appeal of Naples and the trial
court that to convict the members who had operated in both regions, Campania and Emilia-
Romagna, of both the mafia-type association offence and the criminal association offence, as they
had been charged by the prosecutor, would constitute double jeopardy. Both the Court of Appeal
and the trial court had, therefore, correctly avoided the application of multiple criminal association
offences to those defendants.
105
CHAPTER VI.
RELEVANT PROCEDURAL ISSUES
DIGEST OF CASES
Relevant procedural issues in cases of cyber organized crime include jurisdictional issues; identification,
tracing, freezing and seizure of assets and confiscation of proceeds of crime; special investigative tech-
niques (i.e., electronic surveillance, undercover operations, controlled deliveries and other techniques); the
collection and use of electronic evidence (i.e., expedited preservation of data, production orders, real-time
collection of communication traffic data and interception of content data); and various forms of interna-
tional cooperation (i.e., extradition, mutual legal assistance, law enforcement cooperation and joint investi-
gations). Each of these procedural issues are explored below.
A. Jurisdiction
Jurisdiction provides countries with the power and authority to define and preserve the duties and rights of
people within its territory, enforce laws and punish law violations.319 Countries claim jurisdiction over
crimes committed within their territory (principle of territoriality), when crimes are committed by their own
nationals (principle of nationality; active personality principle), when the victims of the crimes are their
own nationals (principle of nationality; passive personality principle) and when the crime impacts the inter-
ests and security of the country (protective principle).320
Laws are implemented to establish rules, mechanisms and ways to resolve jurisdictional issues when
multiple jurisdictional claims are made over transnational organized crime, such as cyber organized
crime. Article 15 of Organized Crime Convention establishes conditions under which jurisdiction can be
asserted and provides guidance on exercising jurisdiction. The conditions under which jurisdiction can
be asserted are when transnational organized crime offences are committed in a country’s territory, when
such offences are committed on board an aircraft or a vessel registered in a country, when such offences
are committed in one country by nationals of another and the country in which the offences were com-
mitted does not extradite the offenders on the ground that they are nationals of the other country and
when such offences are committed in one country against nationals of another country.321 Similar condi-
tions are included in other international laws, such as the United Nations Convention against Corruption
(see art. 42) and the United Nations Convention against Illicit Traffic in Narcotic Drugs and Psychotropic
Substances of 1988 (see art. 4).322 Countries establish jurisdiction over cybercrimes in national law. For
example, Botswana can assert jurisdiction over a cybercrime committed in its territory or in part of its
territory; when the cybercrime involves one of its nationals outside of its territory if the national’s con-
duct would constitute an offence under the law of the country where the offence was committed and if
the person has not been prosecuted for the offence in that country; when the offence was committed on
a ship or aircraft registered in Botswana; and if the offence was committed outside of its territory but had
an impact on Botswana.323
319
See also UNODC Teaching Modules, Cybercrime, Module 7: international cooperation against cybercrime, “Sovereignty and
jurisdiction”; and Module 3: legal frameworks and human rights, “The role of cybercrime law”. Available at sherloc.unodc.org/cld/
en/education/tertiary/cybercrime/module-7/index.html and sherloc.unodc.org/cld/en/education/tertiary/cybercrime/module-3/
index.html.
320
Ibid.
321
UNODC, Legislative Guide for the Implementation of the United Nations Convention against Transnational Organized Crime
(Vienna, 2016), pp. 75–80.
322
Ibid., para. 248.
323
Botswana, Cybercrime and Computer Related Crimes Act, 2018, sect. 3.
108
chapter VI. Relevant procedural issues
When the defendant hacked the systems of the corporation and engaged in extortion, he was phys-
ically located in the Russian Federation. The court asserted that the United States had jurisdiction
because the adverse impact of the defendant’s actions occurred in the United States and because
of the extraterritorial effect of the laws that he was charged with violating. Therefore, the United
States claimed jurisdiction over an act that had had an impact on its territory, although the act had
been perpetrated in a different country.
For more information on this case, see UNODC, SHERLOC case law database, Case No. USAx103.b
a
United States Attorney, District of Connecticut, “Russian man sentenced for hacking into computers in the United States”,
press release, 25 July 2003.
b
Available at https://sherloc.unodc.org/.
According to article 2, paragraph (f), of the Organized Crime Convention, “freezing” or “seizure” refers to “temporarily pro-
324
hibiting the transfer, conversion, disposition or movement of property or temporarily assuming custody or control of property on the
basis of an order issued by a court or other competent authority”.
According to article 2, paragraph (g), of the Organized Crime Convention, “confiscation”, which includes forfeiture where
325
applicable, refers to “the permanent deprivation of property by order of a court or other competent authority”.
According to article 2, paragraph (e), of the Organized Crime Convention, the term “proceeds of crime” refers to “any property
326
109
DIGEST OF CASES
(e.g., mobile phones, computers and SIM cards), firearms and other forms of property have also been
forfeited.329 Confiscation of the proceeds of crime is intended to deter transnational organized crime by
removing the incentives for committing such crime.330
Three of the appellants, C.M.S., G.F. and M.J.B. were charged with and convicted of conspiracy to
defraud and received sentences of 5 years and 6 months of imprisonment, 6 years and 5 months of
imprisonment and 6 years and 6 months of imprisonment, respectively. The other appellant, B.D.R.,
was convicted of converting criminal property contrary to the Proceeds of Crime Act 2002, for which
he received a sentence of 2 years and 10 months of imprisonment. B.D.R. appealed his conviction,
arguing that the Proceeds of Crime Act 2002 did not have an extraterritorial effect. The appellant
argued that the acts that had led to the property becoming “criminal property” took place outside of
the United Kingdom and had had impacts on victims outside the United Kingdom. The court disa-
greed; it held that the mechanics of the fraud had taken place in the United Kingdom and had had
impacts on victims in the United Kingdom. If the mechanics of the fraud had occurred in Spain and
had had impacts on Spanish victims, the court would not claim jurisdiction over the crime. However,
that was not the case. The acts had predominantly taken place in England, including the deprivation
of British victims’ monies. The court thus held that there was jurisdiction to apply the provisions of the
act, particularly the money-laundering provisions under section 340, paragraph (11) (d), of the
Proceeds of Crime Act 2002. The funds that had been obtained pursuant to the advance fee frauds in
the United Kingdom became criminal propertyb once they reached a bank account in the United
Kingdom controlled by the conspirators, and those proceeds did not cease to be criminal property
when they arrived in the appellant’s bank account in Spain.c Accordingly, the court dismissed the
appeal of B.D.R, as well as the appeals of the other appellants.
For more information on this case, see UNODC, SHERLOC case law database, Case No. GBRx095.d
a
England and Wales Court of Appeal, Regina v. Bradley David Rogers, Colin Martin Samuels, Geraldine French, Mark Julian
Bell [2014] EWCA Crim 1680, p. 1.
b
According to section 340, paragraph (3) (a), of the Proceeds of Crime Act 2002, property is criminal property if it constitutes
“a person’s benefit from criminal conduct or it represents such a benefit (in whole or part and whether directly or indirectly)”.
c
Regina v. Bradley David Rogers, Colin Martin Samuels, Geraldine French, Mark Julian Bell, p. 7.
d
Available at https://sherloc.unodc.org/.
329
See, for example, United States District Court, Western District Court of North Carolina, United States of America v. Anthony
Blane Byrnes, Case No. 3:20-CR-109-KDB, p. 2; United States of America v. Sergiy Petrovich Usatyuk; United States of America v.
Andrii Kolpakov and United States of America v. Fedir Oleksiyovich Hladyr, Case No. 17-CR-276RSM. According to article 2, para-
graph (d), of the Organized Crime Convention, “property” refers to “assets of every kind, whether corporeal or incorporeal, movable
or immovable, tangible or intangible, and legal documents or instruments evidencing title to, or interest in, such assets”.
330
UNODC, Legislative Guide for the Implementation of the United Nations Convention against Transnational Organized Crime,
para. 330.
110
chapter VI. Relevant procedural issues
Article 12 of the Organized Crime Convention requires States parties to the Convention to establish meas-
ures to enable the confiscation of criminal proceeds and any “property, equipment or other instrumentalities
used in or destined for use in offences”. The recommendations of the Financial Action Task Force serve as
a framework of measures that facilitate international cooperation on matters relating to criminal assets and
proceeds, which authorities can implement in their own countries according to their national laws.331 The
Stolen Asset Recovery initiative, developed by the World Bank and UNODC, also provides guidance on
how to respond to criminal proceeds.332 The above-mentioned convention, recommendations, guidance and
initiative identify the measures needed to investigate and prosecute transnational organized crime and to
identify and confiscate the proceeds of such crime.
The Organized Crime Convention obligates States to adopt the measures needed to empower competent
authorities to order that bank, financial or commercial records be made available or seized for the purpose
of identifying and freezing assets and ultimately confiscating the proceeds of organized crime.333 The
Convention also requires States to respond to requests for the identification, tracing and freezing or seizure
of such proceeds.334 In addition, the Convention sets out the procedures that need to be followed in order to
confiscate such proceeds.335 Mutual legal assistance (see the discussion in chap. VI, sect. E.2) can be sought
to obtain evidence and information relating to the identification, tracing, freezing, seizure and confiscation
of proceeds of such crime.336
The freezing or seizure of value- or property-based assets that have been identified as being directly or
indirectly derived from transnational organized crime, as well as the confiscation of the proceeds of such
crime, is a complex process. This complexity arises from the variation in national laws and the methods and
approaches taken by countries to identify, trace, freeze or seize assets, as well as the conditions that are in
place to confiscate the proceeds of crime.337 For example, the authorities that authorize freezing or seizure
orders,338 as well as the criteria and conditions that must be met for those orders to be issued, vary between
countries. Variations also exist between countries with respect to data protection and controls regarding the
disclosure of personal and financial information relating to the identification of criminals, their assets and
the proceeds of their crimes.
331
Financial Action Task Force, International Standards on Combating Money Laundering and the Financing of Terrorism and
Proliferation (Paris, 2012–2020), updated June 2021.
332
See https://star.worldbank.org/.
333
Organized Crime Convention, art. 12.
334
Ibid., art. 13.
335
Ibid.
336
Ibid., art. 13, para. 3.
UNODC, Legislative Guide for the Implementation of the United Nations Convention against Transnational Organized Crime,
337
paras. 331–332; UNODC, Manual on International Cooperation for the Purposes of Confiscation of Proceeds of Crime (Vienna, 2012).
A “freezing order” refers to “an order (usually judicial) that leaves physical possession of the asset with the owner or a third party
338
but imposes specific terms and conditions on their use of the asset, or prohibits any right to sell, lease, destroy or otherwise diminish the
value of the asset while the order is in force”. It is also called a “restraint”, “blocking”, “attachment” or “preservation” order in some
jurisdictions (UNODC, Manual on International Cooperation for the Purposes of Confiscation of Proceeds of Crime, p. 3).
111
DIGEST OF CASES
Special investigative techniques are considered an important tool in the arsenal of measures that may be
used to combat cyber organized crime. The techniques are labelled “special” because their use is often
costly and complicated, requiring specialized expertise and sometimes advanced technological knowledge
and instruments. Their use may in some cases pose ethical problems, while in others it may endanger the
operators. It is important to keep in mind that the use of special investigative techniques may infringe on
fundamental individual rights (e.g., the right to privacy).339
1. Electronic surveillance
Electronic surveillance involves the use of ICT to monitor and maintain surveillance of suspects and their
movements and to intercept suspects’ communications. Basically, the suspect’s behaviours, movements and
communications are kept under surveillance.340 Electronic surveillance involves the use of ICT to monitor
communications and movements, intercept telecommunications and electronic communications (telephone
calls, email messages and other messages), track individuals and devices, create audio and video record-
ings, etc.
Electronic surveillance has been used by law enforcement agencies in cases involving cyber organized
crime. This special investigative technique has been used during investigations of cyber-dependent crimes
and cyber-enabled crimes.341 Electronic surveillance is usually regulated by warrants.342 The legal order is
obtained prior to collecting electronic evidence in order to ensure that the evidence is admissible in a court
of law. In the event that a warrant is not required for the surveillance, there are limiting factors to prevent
its arbitrary and illegal use (e.g., privacy considerations, subject notification or the requirement to obtain
non-judicial permission).343
Electronic surveillance is quite intrusive, and its legality varies by jurisdiction. Countries have different
requirements for the use of various forms of electronic surveillance (e.g., audio, visual, tracking and data
surveillance) and have statutory safeguards in place to ensure that the measures taken are respectful of the
rule of law and human rights. Therefore, before using electronic surveillance, national laws, as well as
regional and international laws, and human rights obligations (particularly with respect to the right to pri-
vacy) need to be considered.
If the investigation involves the monitoring of Internet chat rooms, social networking sites or other sites, the
human rights implications of this monitoring may vary, depending on the privacy and security settings and
law enforcement activities on those sites. If the content and activities that are monitored in chat rooms or
social media or other sites are accessible to the public and if privacy and security settings have not been set
to restrict access to content, then there is no reasonable expectation of privacy over this content.344 If, how-
ever, privacy and security settings have been set to restrict access to content to specific persons, then the
user has a reasonable expectation of privacy over their content and activities.345 If law enforcement agents
interact and/or otherwise engage with persons on these sites, countries often require a legal order (e.g., a
search warrant) to authorize the gathering of information about the target through an undercover operation
(for more information about undercover operations, see the subsection that follows).
339
UNODC, Digest of Organized Crime Cases: A Compilation of Cases with Commentaries and Lessons (Vienna, 2012), para. 99.
340
Ibid., p. 43.
341
See, for example, Canada, Ontario Court of Justice, R. v. Kalonji and Germany, LG Limburg, Urteil vom 07.03.2019, 1 KLs – 3
Js 73019/18.
342
See, for example, the Surveillance Devices Act of 2004 of Australia; the Criminal Procedure Code of Germany, sect. 100a;
Interception of Communications and Surveillance Ordinance of Hong Kong, China, chap. 589, sect. 3; the Crimes Act 1961 of
New Zealand, part 11A; the Code of Criminal Procedure of Poland, chap. 26; the Criminal Procedure Code of Serbia, arts. 226
and 228; the Code of Criminal Procedure of Slovakia, sect. 88; the Regulation of Interception of Communications and Provision of
Communication-related Information Act 70 of 2002, of South Africa; and the Regulation of Investigatory Powers Act 2000 of the
United Kingdom (Current Practices in Electronic Surveillance in the Investigation of Serious and Organized Crime (United Nations
publication, 2009), p. 13).
343
Ibid., p. 14.
344
For further information, see United States, Global Advisory Committee, Developing a Policy on the Use of Social Media in
Intelligence and Investigative Activities: Guidance and Recommendations (February 2013); Maras, Computer Forensics; Berkman
Center for Internet and Society, Harvard Law School, Berkman Online Lectures and Discussions, Privacy in cyberspace: module IV –
governmental collection of data, part I. Available at https://cyber.harvard.edu/privacy/module4.html.
345
Ibid.
112
chapter VI. Relevant procedural issues
The first site that was created was the Giftbox Exchange. P. helped to create and manage it. Access to
it was limited to registered users. In order to register, prospective users had to upload illegal material
in order to minimize the risk of undercover law enforcement agents accessing the site. Likewise,
users were required to publish child sexual abuse material at least once a month to have complete
access to the content on the forum. The Giftbox Exchange platform had a strict hierarchical structure.
There were several administrators of the site, one of them being P. The administrators, with full
access to the boards, undertook administration and maintenance tasks to guarantee the faultless
operation of the site on a technical and content-related scale. The administrators were supported in
running the site by 10 moderators. Members that had risen to the ranks of administrator or modera-
tor had the additional responsibility of posting illegal material on a monthly basis. The Giftbox
Exchange chat rooms had a hierarchical structure comparable to that of the forum.
P. was responsible for programming relating to the chats, the recruitment of new members and
the allocation of accounts, in addition to informing members of the forum rules and maintaining
the Giftbox Exchange servers. G. was a chat moderator who was later “promoted” to lead chat
moderator and then chat administrator, where he was responsible for all matters regarding the
chat rooms, including the recruitment of chat room personnel. He acted as the point of contact
for staff members. He also created the seasonally changing background graphics of the chat
rooms. He also undertook other tasks in relation to the forum, including the translation of the
rules into German. M. was a chat moderator who was responsible for user support and supervi-
sion, as well as the supervision of the chat rooms themselves, mainly to ensure compliance with
the forum rules. In addition, M. worked on testing new chat scripts, together with P., and trans-
lated into German the security instructions of the forum. Mä. was a “registeredplus-member”,
and he exercised moderator functions if no other staff member was online. He could issue warn-
ings and block users if necessary. Mä. also worked on testing chat scripts and translating the
instructions by proofreading the translation created by M. As part of the posting and verification
duties, defendants M., G. and P. posted child sexual abuse material and child sexual exploitation
material in order to make the material accessible to users of the forums, as well as to encourage
other users to share material.
In this case, the court of first instance discussed the composition of organized criminal groups on
the darknet. In examining the roles of the defendants and their tasks, the court held that the defend-
ants, as well as each member registered on the forums or the chat rooms of the platform, were
considered members of an organized criminal group. The court held that the members of the plat-
forms had implicitly joined the organized criminal group of the defendants by registering for the
forums. The members came together with the intent to independently commit numerous, and at
the time of registration, unknown offences of the same type of crime for a certain period of time in
the future. Through their actions, the defendants, as well as all registered members, aimed at
obtaining child abuse and exploitation material not yet in their possession and to exchange views on
topics including paedophilia and child abuse. The court also held that the fact that the members of
the organized criminal group did not know each other personally and communicated with nick-
names or pseudonyms was irrelevant to their classification as an organized criminal group.
113
DIGEST OF CASES
In the course of investigations, investigating police were able to associate the forum with an
Australian hosting provider. In Australia, Task Force Argos of the Queensland Police Service was
able to seize the data of the forum, including threads, postings and not yet deleted messages, and
take over the operation of the platform. P. noticed that something was wrong and – via the darknet
– warned users not to visit the Giftbox Exchange. Furthermore, he backed up the data of the plat-
form and tried to close the server. The same persons responsible for running the Giftbox Exchange
then created a new platform, Elysium, under the leadership of P. In order to log in to the platform
and have unlimited access to content, registration was again required. The obligation to post mate-
rial for verification purposes was, however, not introduced, which led to the registration of a large
number of users within a short period of time.
After locating the server of the Elysium platform, law enforcement authorities conducted electronic
surveillance of the server and of one defendant, M., as well as undercover operations. The surveil-
lance measures included uploading avatar (or user profile) images to confirm the server location,
as well as the monitoring of messages. This electronic surveillance helped to identify defendants
M. and Mä., which subsequently led to the identification of P. In addition, the Federal Criminal Police
Office of Germany obtained child sexual abuse images involving G., which ultimately led to the iden-
tification of G.
M. was charged with and convicted of ring-based dissemination of child sexual abuse material;
procuring, for another, child sexual abuse material; production of child sexual abuse material; and
aggravated child sexual abuse in conjunction with procurement of child sexual abuse material,a for
which he received a sentence of 8 years’ imprisonment. Mä. was charged with and convicted of ring-
based dissemination of child sexual abuse material and possession of child sexual abuse material.
He received a sentence of 3 years and 10 months of imprisonment. G. was charged with and con-
victed of ring-based dissemination of child sexual abuse material; procuring, for another, child
sexual abuse material; production of child sexual abuse material; and aggravated child sexual
abuse in conjunction with procurement of child sexual abuse material.b For those offences, he was
sentenced to 9 years and 9 months of imprisonment; however, that sentence was reduced to 8 years
and 7 months of imprisonment given the reversal of the conviction for aggravated child sexual
abuse in conjunction with procurement of child sexual abuse material on appeal. Finally, P. was
charged with and convicted of ring-based dissemination of child sexual abuse material and ring-
based procurement, for another, of child sexual abuse material.c He received a sentence of 6 years
and 6 months of imprisonment.
For more information on this case, see UNODC, SHERLOC case law database, Case No. DEUx024.d
a
In the court of first instance, M. was also charged with and convicted for the possession of child sexual abuse material.
That conviction was subsequently reversed on appeal.
b
G. was also charged with and convicted for other crimes. Those convictions were subsequently reversed on appeal.
c
In the court of first instance, P. was also charged with and convicted for the possession of child sexual abuse material.
That conviction was subsequently reversed on appeal.
d
Available at https://sherloc.unodc.org/.
2. Undercover operations
An undercover operation involves the use of an undercover agent, an informant (i.e., a person who provides
information about a crime or suspect) or some other person to infiltrate an organized criminal group.
Informants may or may not be criminals. They are used in undercover operations because they can provide
access to closed organized criminal groups, places or spaces where members of those groups gather and/or
where the group members engage in and/or conspire to commit transnational organized crime. Undercover
operations are difficult and risky for those involved, and they require a significant investment in time and in
human, financial and technical resources.
114
chapter VI. Relevant procedural issues
The purpose of undercover operations is to gather evidence of crimes planned and those committed and to
obtain insight into the structure, organization and roles and/or identities of members of the organized crim-
inal group. In one case in the United States, a female victim of an international romance fraud notified law
enforcement authorities of the incident.346 An agent of Homeland Security Investigations, the investigative
component of the Department of Homeland Security of the United States, posed as the victim and continued
to communicate with the perpetrators. The communications helped criminal justice authorities to under-
stand the nature and scope of the international romance fraud and ultimately led to the perpetrators of this
fraud being brought to justice.
No member of the group knew the true identities of the other members – only the nicknames pro-
vided by the members. To avoid detection by law enforcement authorities, the nicknames of mem-
bers and the location of the newsgroup were frequently changed, and members altered filename
extensions of child sexual abuse material to hide the true nature of what was being traded. Members
of the newsgroup also used encryption, and encryption keys were regularly changed. The child
sexual abuse material was traded in the newsgroup as binary files that could not be accessed with-
out a key.b
Despite being a member of a group that engaged in serious crime, the defendant was not charged
with a crime associated with organized crime, such as participation in an organized criminal group.
Instead, the perpetrator was charged with, pleaded guilty to and was sentenced for the following
offences:c
(a) Use of a carriage service (the Internet) to access child pornography material between
6 January 2006 and 29 February 2008;
(b) Use of a carriage service (the Internet) to cause child pornography material to be trans-
mitted to himself between the same dates;
(c) Use of a carriage service (the Internet) to transmit child pornography material between
the same dates;
(d) Recording an indecent visual image of a child under the age of 16 years without legitimate
reason between 31 December 2007 and 1 February 2008.
The defendant engaged in these crimes for his own sexual gratification and not for financial rea-
sons. Nevertheless, financial contributions were made by some members of the group to other
members when requests were made for custom-ordered child sexual abuse material.d
In 2006, law enforcement authorities infiltrated the group and conducted an undercover operation
that lasted 26 months.e At the time of the investigation, there were 43 members of the group.f Even
though the defendant cooperated with investigators, the identities of other members of the group
could not be determined. The defendant was sentenced to six years’ imprisonment. A subsequent
appeal lodged by the defendant on the basis that the sentence was manifestly excessive was
unsuccessful.
United States of America v. Oladimeji Seun Ayelotan, Femi Alexander Mewase and Rasaq Aderoju Raheem, Case No. 17-60397,
346
p. 2.
115
DIGEST OF CASES
For more information on this case, see UNODC, SHERLOC case law database, Case No. AUSx208.g
a
R v. Mara [2009] QCA 208, para. 6.
b
Ibid., para.7.
c
Ibid., para. 3.
d
Ibid., para. 8.
e
Ibid., para. 9.
f
Ibid.
g
Available at https://sherloc.unodc.org/.
Undercover operations can also involve the infiltration of an individual into an organized criminal group or
illicit network to participate in its general criminal activity or in a specific illicit business.347 For example,
in the case of the DarkMarket site, an undercover FBI agent, posing as a cybercriminal, infiltrated the site
and eventually became one of the site’s administrators (i.e., Master Splyntr).348 In the Phantom Secure case,
the Royal Canadian Mounted Police purchased Phantom Secure devices, posed as drug traffickers and,
through their undercover operations, were able to establish that the company had tailored its services to
criminals.349 Undercover agents in the United States also posed as drug traffickers, met with the founder and
chief executive officer of Phantom Secure and were able to establish that the devices had been created to
facilitate serious crime.350
The present digest includes many cases in which undercover operations were used, particularly in cases
involving cyber-enabled crime.351 The legality of undercover operations varies depending on the jurisdic-
tion. In most jurisdictions, undercover officers are not allowed to encourage suspects to commit crimes that
they would not ordinarily commit, either as an agent provocateur or through entrapment.352 Countries also
place restrictions on the manner in which an undercover operation is conducted and on what those involved
in the operation can do (e.g., undercover law enforcement officers may not be allowed to commit any
crimes, or they may be allowed to commit only certain crimes). The use of informants is also regulated in
order to protect informants and to ensure that guidelines are in place on the use, management, supervision
and, where relevant, payment of informants.
3. Controlled delivery
Controlled delivery is defined in the Organized Crime Convention as a technique that allows “illicit or sus-
pect consignments to pass out of, through or into the territory of one or more States, with the knowledge
and under the supervision of their competent authorities, with a view to the investigation of an offence and
the identification of persons involved in the commission of the offence”.353 This technique was initially used
to combat drug trafficking. The United Nations Convention against Illicit Traffic in Narcotic Drugs and
Psychotropic Substances of 1988 regulates the use of this special investigative technique for investigating
cases involving drug trafficking. In article 1, paragraph (g), of the Convention, “controlled delivery” is
defined as a technique allowing illicit or suspect consignments of narcotic drugs, psychotropic substances,
substances in Table I or II of the Convention (i.e., precursor chemicals) or substances substituted for them,
to pass out of, through or into the territory of one or more countries, with the knowledge and under the
347
UNODC, Digest of Organized Crime Cases, p. 42.
348
United States, Federal Bureau of Investigation, “‘Dark Market’ takedown: exclusive cyber club for crooks exposed”,
20 October 2008.
349
United States of America v. Vincent Ramos, Case No. 3:18-CR-01404-WQH.
350
Ibid.
351
See, for example, United States of America v. Gal Vallerius (Dream Market); Germany, LG Limburg, Urteil vom 07.03.2019,
1 KLs – 3 Js 73019/18; United States of America v. Eoin Ling Churn Yeng and Gal Vin Yeo Siang Ann, Case No. 3:16 CR 00090;
United States of America v. Dylan Heatherly, No. 19-2424 and United States of America v. William Staples, No. 19-2932. There
are, however, exceptions. See, for example, United States of America v. Aleksandr Andreevich Panin and Hamza Bendelladj, Case
No. 1:11-CR-0557-AT-AJB (SpyEye).
352
CTOC/COP/WG.7/2013/2, para. 18.
353
Organized Crime Convention, art. 2, para. (i).
116
chapter VI. Relevant procedural issues
supervision of their competent authorities, with a view to identifying persons involved in the commission
of offences established in accordance with the Convention.
Controlled delivery is also used in the investigation of other forms of transnational organized crime. This
special investigative technique has been used to identify and trace the origin, route and destination of illegal
goods and trafficked wildlife specimens. It has also been used where contraband is identified or intercepted
in transit and then delivered under surveillance to identify the intended recipients or to monitor its subse-
quent distribution throughout a criminal organization.354 While controlled delivery has also been used in
cases involving the smuggling of migrants and trafficking in persons, and increasingly in cases involving
firearms trafficking, its use for investigating those crimes is problematic and has usually been limited to
exceptional circumstances, and it is used only if specific conditions are met (e.g., sufficient safeguards are
in place to ensure protection of victims).355 Overall, the methods that can be used involve intercepting illicit
or suspect consignments and doing one of the following: (a) allowing them to continue to their destination
intact; (b) replacing them in whole or in part and then allowing them to continue to their destination; or
(c) removing the identified illicit or suspect consignments.356 The legality, conditions and limits for the use
of this special investigative technique vary by country.357
United States v. Anthony Blane Byrnes, Case No. 3:20-CR-192 (W.D.N.C. 2020)
(United States of America)
The defendant (A.B.B.) conspired with an organized criminal group (i.e., a regional drug trafficking
organization) to distribute and to possess with the intent to distribute controlled substances, such
as stimulant and hallucinogenic drugs (e.g., DMT, lysergic acid diethylamide (LSD), 3,4-methylene-
dioxymethamphetamine (MDMA, commonly known as “ecstasy”)).a According to the criminal com-
plaint, he came to the attention of law enforcement authorities when United States Customs and
Border Protection intercepted a package from Slovenia that was addressed to the defendant. The
package was found to contain narcotic drugs. Law enforcement authorities arranged for the con-
trolled delivery of the package to the defendant’s address. After law enforcement officers observed
the defendant collecting the package and bringing the package into his residence, they executed a
search warrant for the defendant’s residence. During the search of the defendant’s residence, they
found and seized different forms of controlled drugs, as well as a firearm and ammunition. The
defendant revealed to law enforcement authorities that the controlled drugs had been purchased
via the Empire Market darknet site. The defendant also revealed that he had facilitated the pur-
chase of controlled drugs with bitcoins and used his mobile phone and certain phone applications
to communicate with other conspirators and otherwise facilitate drug trafficking. He was sentenced
to 5 years and 11 months of imprisonment.b
For more information on this case, see UNODC, SHERLOC case law database, Case No. USAx210.c
a
United States District Court, Western District of North Carolina, United States of America v. Anthony Blane Byrnes, p. 1.
b
United States Attorney’s Office, Western District of North Carolina, “Huntersville, N.C. man is sentenced to prison for
trafficking narcotics on the dark web using bitcoin ATMs & virtual wallets”, press release, 10 September 2020.
c
Available at https://sherloc.unodc.org/.
354
UNODC, Legislative Guide for the Implementation of the United Nations Convention against Transnational Organized Crime,
para. 443.
355
Ignacio Miguel de Lucas Martín and Cristian-Eduard Stefan, Transnational Controlled Deliveries in Drug Trafficking
Investigations Manual, co-funded by the European Commission Directorate-General Migration and Home Affairs, as a result of
the project “Enhancing the cooperation of European Union Legal Enforcement Agencies for successful drug controlled deliveries”
(JUST/2013/ISEC/DRUGS/AG/6412), pp. 48–49.
356
UNODC, Legislative Guide for the Implementation of the United Nations Convention against Transnational Organized Crime,
para. 451.
357
CTOC/COP/WG.7/2013/2, pp. 6–7.
117
DIGEST OF CASES
4. Other techniques
Other special investigative techniques include the use of “exploits” (codes that take advantage of software
vulnerability or security flaws to allow intruders to remotely access a network and gain elevated privileges),
malware and hacking to access sites, servers and tools used by cyber organized criminal groups. Taking
advantage of exploits in ICT, hacking and using malware are becoming more commonplace as special
investigative techniques in some countries. This, in turn, has raised concern about the impact of these tech-
niques in terms of respect for the rule of law and respect for human rights. One example is the law enforce-
ment operation known as Trojan Shield, in which law enforcement agencies ran a sting operation providing
mobile phones that performed a single function hidden behind a calculator app: sending encrypted mes-
sages and photographs.358
In the United States, these techniques have been labelled “network investigative techniques”. Such techniques
were used in Operation Pacifier, a law enforcement operation that shut down Playpen, one of the largest sites on
the darknet, which had housed child sexual abuse material and child sexual exploitation material. Once the FBI
gained access to the Playpen server, it was copied and the FBI continued to operate the Playpen website on its
own server. After the FBI agents gained control of the server and the site, they placed malware on a link on the
site. Once users clicked on the link, the malware was downloaded on their device and used to identify the
IP addresses and ultimately other identifying data of those who had accessed the site and clicked on the link.
The so-called network investigative technique used in the operation that resulted in the Playpen site being
shut down has been referred to as a “watering hole attack”.359 The network investigative technique config-
ured the target server to install software on the devices of users accessing the site.360 Once downloaded on
the user’s device, identifying information about the user’s device was relayed to the FBI.361 The information
collected from the use of the network investigative technique was used to effectuate the arrest of persons in
various countries. In each of the countries, the law enforcement authorities utilized the information obtained
using the network investigative technique to arrest perpetrators within their country’s borders. Searches
based on information obtained from the use of the network investigative technique were thus viewed as
permissible by the authorities in those countries. In the United States, certain features of the source code of
the network investigative technique are classified and requests to reveal the technique source code have
been denied,362 even when this denial has resulted in the dismissal of charges against defendants.363 In addi-
tion to taking advantage of known software vulnerabilities and/or exploiting “zero-day vulnerabilities”
(software vulnerabilities unknown to those interested in fixing them, including the vendor of the software),
law enforcement agencies have also used malware such as keylogging software (software recording the
keystrokes of users) in investigations of members of organized criminal groups.364
Yan Zhuang, Elian Peltier and Alan Feuer, “The criminals thought the devices were secure, but the seller was the FBI”,
358
118
chapter VI. Relevant procedural issues
obstacles to introducing the data as evidence in court. Moreover, given the cross-border nature of cyber organ-
ized crime and the different legal systems around the world, the rules of evidence vary between countries. This
variation serves as an obstacle to the collection, requesting and use of electronic evidence in national courts.
What also varies between countries are the conditions and safeguards for the collection and use of electronic
evidence in courts of law in a manner that respects the rule of law and human rights. The conditions and safe-
guards for the collection and use of electronic evidence predominantly require judicial or other independent
supervision and delineate and place limits on the procedures, processes, methods and tools used to collect,
acquire, preserve and analyse electronic evidence. National laws include provisions on rules of evidence,
investigative powers and criminal procedure that relate to data collection and use. Some of these investigative
powers and rules are discussed below, particularly the expedited preservation of data, production orders, the
real-time collection of data and the interception of content data.
2. Production orders
A production order compels the recipient of the order to provide and/or grant access to information (or
material) to those requesting it within a specific period of time. The recipient of the order can be an individ-
ual within a territory, a service provider367 within a territory or a service provider that provides services
within that territory. Georgia, for example, has an international production order that may be used to
empower a Georgian judge to issue a production order in respect of persons or entities outside of the
According to article 1, paragraph d, of the Council of Europe Convention on Cybercrime, “traffic data” refers to “any computer
365
data relating to a communication by means of a computer system, generated by a computer system that formed a part in the chain of
communication, indicating the communication’s origin, destination, route, time, date, size, duration, or type of underlying service”.
Similar descriptions are included in national laws, such as the Computer Misuse and Cybercrimes Act, 2018, of Kenya and Republic
Act No. 10175 of the Philippines (also known as the Cybercrime Prevention Act of 2012).
366
Kenya, Computer Misuse and Cybercrimes Act, 2018; Sri Lanka, Computer Crime Act No. 24 of 2007; A/74/130,
paras. 349–361.
A public or private entity that provides telecommunication and electronic communication services.
367
119
DIGEST OF CASES
territorial jurisdiction of Georgia if the following conditions are met: agreement of the person who is the
subject of the order with the voluntary disclosure of electronic data; and permission from the host country
of the foreign entity for such disclosure through its laws or executive policies.368 Like a preservation order,
a production order only applies to data already stored and does not require data about future communica-
tions to be stored. The data referred to in the production order are computer data and/or subscriber data
(i.e., information held by a service provider that relates to subscribers of its services).369
The authority that can compel disclosure of subscriber data varies by country. Some countries (e.g.,
Australia, Denmark, Finland and the United Republic of Tanzania) provide law enforcement agencies with
the authority to order the disclosure of this information, while other countries (e.g., Azerbaijan, Bosnia and
Herzegovina, Jamaica and Romania) require prosecutorial or judicial authorization to compel disclosure.370
Some countries have designated persons or specialized agencies that compel disclosure of subscriber data
(e.g., specialized directorates and departments of the state agency in Bulgaria and the State Attorney in
Croatia).371 In other countries (e.g., Austria), the authorizing agency depends on the type of subscriber
data.372 Some countries have different requirements for obtaining communication traffic data (e.g., rather
than police obtaining access to such data, judicial authorization is required).373 These countries view the
interference with the rights of individuals to be substantially different when obtaining subscriber informa-
tion than when obtaining communication traffic data. For this reason, different rules apply for obtaining
such information.374 Overall, the conditions for compelling disclosure and/or obtaining subscriber informa-
tion and communication traffic data differ from country to country.
Tribunal Penal del Tercer Circuito Judicial de San José, Causa penal
número 15-001824-0057-PE & Causa Penal número 19-000031-0532-PE
(Operación R-INO) (Costa Rica)
A criminal group (R.Z.R., L.G.G., J.M.R.F., V.V.C., E.D.S.C. and J.T.N.R.) with a structured division of
roles and with members from Brazil, Costa Rica and Mexico was dedicated to producing, dissemi-
nating and commercializing child sexual abuse material and child sexual exploitation material on
different websites. The members of the criminal group in Mexico (R.Z.R., L.G.G. and J.M.R.F.) were
Mexican nationals. R.Z.R. was the head of the organization in Mexico. L.G.G., his wife, was in charge
of making payments (through a well-known money transfer service) to E.S.C., who was located in
Costa Rica, for the logistics of the production of child sexual abuse material. J.M.R.F. was in charge
of transferring money obtained from the commercialization of the child sexual abuse material and
child sexual exploitation material on their websites to accounts in Texas and to bank accounts in
Mexico City. V.V.C., a Mexican national operating from Brazil and Mexico, was in charge of recruiting
victims and producing child sexual abuse material and/or child sexual exploitation material. The
recruitment of victims, mostly minors, took place through a modelling agency, promoting castings
368
A/74/130, para. 109.
369
According to article 18, paragraph 3, of the Council of Europe Convention on Cybercrime, the term “subscriber information”
refers to any information contained in the form of computer data or any other form that is held by a service provider, relating to sub-
scribers of its services other than traffic or content data and by which can be established: (a) the type of communication service used,
the technical provisions taken thereto and the period of service; (b) the subscriber’s identity, postal or geographical address, telephone
and other access number, billing and payment information, available on the basis of the service agreement or arrangement; and
(c) any other information on the site of the installation of communication equipment, available on the basis of the service agreement or
arrangement. Similar descriptions are included in national laws, such as the Computer Misuse and Cybercrimes Act, 2018, of Kenya
and the Cybercrime Prevention Act of 2012 of the Philippines.
370
Cybercrime Convention Committee, Rules on Obtaining Subscriber Information, report adopted by the Cybercrime Convention
Committee at its 12th Plenary (Strasbourg, France, 2–3 December 2014), pp. 17–20; United Republic of Tanzania, Cybercrimes Act
of 2015; Jamaica, Cybercrimes Act of 2015.
371
Cybercrime Convention Committee, Rules on Obtaining Subscriber Information.
372
Ibid.
373
Ibid., pp. 26–28.
374
Ibid., p. 28.
120
chapter VI. Relevant procedural issues
through social networking sites. Several photographers conducted auditions with minors and pro-
duced child sexual abuse material involving girls for distribution on websites. The other two mem-
bers, E.D.S.C. and J.T.N.R., were located in Costa Rica. E.D.S.C. was responsible for creating and
registering different websites, whereas J.T.N.R. was responsible for recruiting victims and produc-
ing child sexual abuse material and/or child sexual exploitation material.
The members of the organized criminal group created various pages redirecting users to other
sites to ensure that the web pages of the sites containing child sexual abuse material and/or child
sexual exploitation material were restricted in the public IP addresses assigned to Costa Rica so
that they could be accessed only from abroad. In this way, they tried to control their visibility and
cover the traces of the crime. Membership rights to access the content were paid through a sepa-
rate website (www.support-gurus.com) via encrypted online transactions. The membership cost
was US$ 30 a month for accessing material that included child sexual abuse and exploitation
images and video recordings.
The investigation was carried out by the human trafficking and migrant smuggling unit of the judi-
cial investigation agency of Costa Rica. The investigation of the Internet domains resulted in the
identification of 41 websites on which material involving the sexual abuse of girls from Brazil, Costa
Rica and Mexico was commercialized. Some of the websites were registered by individuals from
those three countries, which allowed each of the members of the organized criminal group to be
identified. The sites on the dark web were accessed using Tor, due to geoblocking (technology that
restricts access to Internet content on the basis of the user’s geographical location). An undercover
agent used a fictitious email address to create an account and access the sites. A significant amount
of child sexual abuse material and child sexual exploitation material was downloaded and used as
evidence for the case.
For the first time in Costa Rica, raids were carried out on websites by means of a court order
(decision made by a judge of the Republic).
On 2 February 2017, an application was sent to the Ministry of Public Security for authorization by
the computer crime section of the judicial investigation agency to enter the investigated websites.
Subsequently, a request was made to extend the authorization to allow access to and the examina-
tion and collection of child sexual abuse material and/or child sexual exploitation material. This is
referred to as the jurisdictional order of the criminal judge of San José for authorization to access,
examine and obtain material with child pornographic content from Internet websites. This request
indicated the reasons why it was necessary to expand the search and obtain the material.
On 15 March 2017, a fiscal request and jurisdictional order of the criminal judge of San José was
submitted by the Ministry to the criminal court to allow sexual abuse material to be accessed on
and obtained from the websites. The request was approved and ordered by the judge.
Only two members of the organized criminal group were prosecuted in Costa Rica (E.D.S.C. and
J.T.N.R.). E.D.S.C. was sentenced to 39 years’ imprisonment for several charges relating to criminal
association, trafficking in persons, child sexual abuse and production and distribution of child
sexual abuse material and child sexual exploitation material, among other offences. J.T.N.R.
received 149 years and 4 months of imprisonment for several charges relating to criminal associa-
tion, production and distribution of child sexual abuse material and child sexual exploitation mate-
rial, and trafficking in persons, among other offences. J.T.N.R.’s sentence was subsequently
reduced to 28 years’ imprisonment.
For more information about this case, see UNODC, SHERLOC case law database, Case No. CRIx007.a
a
Available at https://sherloc.unodc.org/.
121
DIGEST OF CASES
United States v. Steven W. Chase, Case No. 5:15-CR-00015 (W.D. North Carolina,
8 May 2017) (United States of America)
The defendant, S.W.C., created and served as the administrator for Playpen, a darknet bulletin
board and website dedicated to trade in child sexual abuse material. Users of Playpen were able to
anonymously exchange and purchase illicit material via bulletin boards and communicate with
other users via forums, subforums and private messaging. On the site, child sexual abuse material
was organized by age and gender of the victim (including male and female toddlers, prepubescents
and pubescents) under different “boards”.
As an administrator of the site, S.W.C. ran the site and was responsible for tasks such as handling
the technical needs of the site, hosting the site, developing and enforcing the rules of the site,
admitting new members and deleting existing members.a Playpen also had moderators who were
responsible for deleting content deemed to be not relevant or inappropriate, moving content to the
appropriate forum if it was posted in the wrong location and banning users for violating the rules of
the site.b
S.W.C. was charged with and tried and convicted for engaging in a child exploitation enterprise
(United States Code, Title 18, sect. 2252A (g)), advertising child sexual abuse material (Title 18, sect.
2251 (d) and (e)), transporting child sexual abuse material (Title 18, sect. 2252A (a), para. (1), and
(b), para. (1)), and possessing child sexual abuse material that involved a prepubescent minor or a
minor under 12 years of age (Title 18, sect. 2252A (a), para. (5)(B), and (b), para. (2)).c He was sen-
tenced to 30 years’ imprisonment for engaging in a child exploitation enterprise and for advertising
child sexual abuse material and to 20 years’ imprisonment for transporting child sexual abuse
375
Generally, the period of time is included in national laws. For example, in Pakistan the period of time for real-time collection
of data is set at seven days (see section 36 of the Prevention of Electronic Crimes Act of 2016).
376
Certain countries have provisions in law to contact the targets of the collection after the fact (e.g., Georgia, the Republic of
Moldova, and Ukraine). For more information, see Council of Europe experts under the Cybercrime@EAP III project, Conditions and
Safeguards under Article 15 of the Convention on Cybercrime in the Eastern Partnership (May 2018).
377
See, for example, Sri Lanka, Computer Crimes Act No. 24 of 2007, sect. 24; United Republic of Tanzania, Cybercrimes Act of
2015, sect. 21; and Pakistan, Prevention of Electronic Crimes Act of 2016, sect. 38.
378
See, for example, Mauritius, Computer Misuse and Cybercrime Act 2003, sect. 15, para. 1.
122
chapter VI. Relevant procedural issues
material and possessing child sexual abuse material involving a prepubescent minor or a minor
under 12 years of age.d Since his sentences run concurrently, he will serve 30 years’ imprisonment
for his crimes. Another administrator of the site (M.M.F) and a so-called “global moderator” (D.B.),
who pleaded guilty to engaging in a child exploitation enterprise, likewise received lengthy terms of
imprisonment (i.e., 20 years).e Other members of the site have also been prosecuted in separate
cases.f
After S.W.C’s arrest, the server in North Carolina, where Playpen was hosted, was seized by the FBI
and a copy of the server was made on a government-controlled server located in Virginia. The FBI
also obtained legal authorization – a search warrant – to use a network investigative technique. The
FBI further received judicial authorization in the form of a wiretap authorization (i.e., a “Title IIIg
authorization”) to monitor Playpen site users for a limited period of time. The court-authorized
network investigative technique enabled the FBI to identify users of the site – their identities and
locations. To assist in the identification of the users of the devices that accessed Playpen by enter-
ing the site through their registered account (as well as the users’ location), IP addresses and
media access control addresses (in addition to other information) were collected.h The monitoring
of all of Playpen’s postings and messages was conducted by the FBI in accordance with Title III of
the Omnibus Crime Control and Safe Streets Act of 1968.i These court authorizations, therefore,
legally enabled the FBI to obtain real-time communication traffic data and content data (for more
information on the real-time collection of content data, see chap. VI, sect. D.4, below).
For further information about this case, see UNODC, SHERLOC case law database, Case No.
USAx151.j
a
United States District Court, Western District of North Carolina, United States of America v. David Lynn Browning, Case
No. 3:15MJ279, Affidavit of Karlene Clapp in support of complaint and arrest of David Lynn Browning, 29 July 2015, para. 10.
b
Ibid.
c
United States District Court, Western District of North Carolina, United States of America v. Steven W. Chase, Case
No. 5:15-CR-00015-001.
d
Ibid., p. 1.
e
United States District Court, Western District of North Carolina, United States of America v. David Lynn Browning, Case No.
5:15 CR 15-RLV, Plea Agreement, 10 December 2015; United States of America v. Michael Fluckiger, Case No. 5:15 CR 15-RLV,
Plea Agreement, 24 November 2015.
f
See, for example, United States Court of Appeals, Fifth Circuit, United States of America v. Daryl Pawlak, Case No. 17-11339,
15 August 2019.
g
Title III of the Omnibus Crime Control and Safe Streets Act of 1968 (also known as the Wiretap Act).
h
United States District Court, Eastern District of Virginia, In the matter of the search of computers that access upf45jv3bziuctml.
onion, Case No. 1:15-SW-89, 20 February 2015, p. 25.
i
United States District Court, Western District of North Carolina, United States of America v. Steven W. Chase, Case No.
5:15-CR-15-RLV, 1 September 2016, p. 9.
j
Available at https://sherloc.unodc.org/.
379
For more information, see Council of Europe experts under the Cybercrime@EAP III project, Conditions and Safeguards under
Article 15 of the Convention on Cybercrime.
380
Ibid.
381
For example, Armenia and Azerbaijan (see Council of Europe experts under the Cybercrime@EAP III project, Conditions and
Safeguards under Article 15 of the Convention on Cybercrime).
123
DIGEST OF CASES
The interception of content data interferes with the privacy of communications. Because it is a privacy-in-
vasive measure, safeguards and limits have been placed on its use in investigations in national law. Important
limits that have been identified in national law and human rights case law are: the time limits placed on the
use of these powers; restriction of the use of these powers to certain serious crimes; limiting the use of these
powers to specific individuals being investigated for serious crimes; and the use of these powers as a last
resort, when other less invasive means are not as effective.382 Essential safeguards in national law for the use
of this investigatory power are legal orders (i.e., search warrants and wiretaps) and judicial or other inde-
pendent supervision.383 In Australia, for example, safeguards include requirements for the judicial authority
to exercise power, parliamentary reporting requirements, the right of defendants to challenge the admissi-
bility of evidence and the right of review, and the oversight of all telecommunications warrants by the
Commonwealth Ombudsman.384 Both the real-time collection of communication traffic data and the inter-
ception of content data are considered special investigative techniques (see chap. VI, sect. C, above).385
In some countries,386 notification for the real-time collection of traffic data and/or the interception of content
data is not required.
During the investigation, F.A. was arrested and placed in pretrial custody. The real-time collection
of content data (in particular, telecommunications data) as a result of the wiretapping of members
of the group revealed that M.C. had taken the lead and continued the scam while F.A. was in cus-
tody. M.C. and A.O were subsequently arrested and placed in pretrial custody. A European arrest
warrant was issued for C.E., one of the members of the group, but as authorities were not able to
locate him, he was tried in absentia.
Of the six defendants arrested in this case, five were charged with and sentenced for committing
fraud as part of an organized criminal group (F.A., A.O., V.E., M.C. and C.E.). One of the defendants
(V.E.) had her sentence suspended. The remaining defendants were sentenced to five years’
382
For example, the time limit in Georgia and the Republic of Moldova is one month; in Ukraine, two months; and in Armenia
and Azerbaijan, six months. Provisions in law also enables the extension of the period of interception under certain circumstances
(Council of Europe experts under the Cybercrime@EAP III project, Conditions and Safeguards under Article 15 of the Convention
on Cybercrime).
383
See, for example, national laws in Belarus, Georgia and Sri Lanka (Council of Europe experts under the Cybercrime@EAP
III project, Conditions and Safeguards under Article 15 of the Convention on Cybercrime; Sri Lanka, Computer Crime Act No. 24
of 2007).
384
A/74/130, para. 28.
385
See, for example, Republic of Moldova (Council of Europe experts under the Cybercrime@EAP III project, Conditions and
Safeguards under Article 15 of the Convention on Cybercrime, pp. 51–52).
386
For example, Armenia and Azerbaijan (Council of Europe experts under the Cybercrime@EAP III project, Conditions and
Safeguards under Article 15 of the Convention on Cybercrime).
124
chapter VI. Relevant procedural issues
imprisonment (F.A., M.C. and C.E.) and three years’ imprisonment (A.O.), in addition to being
ordered to pay varying amounts of compensation to the victims. The sixth defendant (A.A.) was
charged with receiving money obtained from the fraud but was ultimately acquitted by the court.
For more information on this case, see UNODC, SHERLOC case law database, Case No. FRAx029.a
a
Available at https://sherloc.unodc.org/.
E. International cooperation
International cooperation involves countries working together to achieve common goals. Cooperation
between criminal justice authorities in different countries can include the sharing of information and human,
technical and/or financial resources during investigations and prosecutions of cyber organized crime.
International cooperation is dependent on existing relationships between countries. This type of interna-
tional cooperation can be informal or formal. Informal international cooperation is based on criminal justice
387
Europol, Internet Organised Crime Threat Assessment 2020, p. 17; United States of America v. John Doe #1, Edward Odewaldt,
et al. (Dreamboard members used encryption).
388
Europol, Internet Organised Crime Threat Assessment 2020, p. 17.
389
United States of America v. John Doe #1, Edward Odewaldt, et al. (Dreamboard members used proxy servers).
390
United Kingdom, Royal Courts of Justice, Regina v. Reece Baker and Sahil Rafiq [2016] EWCA Crim 1637, 2016 WL 06476265.
391
United States of America v. Caleb Young, p. 15.
392
Regina v. Reece Baker and Sahil Rafiq [2016] EWCA Crim 1637.
393
United States of America v. Paras Jha, chap. II, sect. C, para. 8.
394
United States District Court, District of Nevada, United States of America v. Valerian Chiochiu, 10 April 2019; United States of
America v. Valerian Chiochiu, Case No. 2:17-CR-306-JCM-PAL, Plea Agreement, 31 July 2020.
395
Kevin Conlan, Ibrahim Baggili and Frank Breitinger, “Anti-forensics: furthering digital forensic science through a new
extended, granular taxonomy”, Digital Investigation, vol. 18 (2016), p. 67.
125
DIGEST OF CASES
actor cooperation between countries. Formal international cooperation can be based on multilateral, regional
or bilateral treaties. The Organized Crime Convention can serve as a basis for formal international cooper-
ation as it includes provisions on mechanisms to facilitate such cooperation. States parties to the Convention
are required to take measures that facilitate various forms of international cooperation, including extradi-
tion, mutual legal assistance, law enforcement cooperation and joint investigations. Each of these measures
is discussed in the present section.
A few days after the bank fraud was perpetrated, the appellant and M. were arrested, interviewed
and subsequently released on bail. Following their release, they left the country, travelling on
flights to the Republic of Moldova (M.) and Romania (the appellant). Following the issuance of
European arrest warrants for both individuals, they were extradited to England.
The appellant pleaded guilty to conspiracy to defraud and was sentenced to 4 years and 10 months
of imprisonment. M. was sentenced to 2 years and 10 months of imprisonment for the same offence.
The other conspirators (P. and B.) received sentences of 5 years’ imprisonment and 7 years’ impris-
onment, respectively, for their roles in the fraud. The appellant’s subsequent appeal against his
sentence was unsuccessful.
For more information on this case, see UNODC, SHERLOC case law database, Case No. GBRx096.a
a
Available at https://sherloc.unodc.org/.
1. Extradition
Extradition involves the return of wanted fugitives to the country requesting extradition. Extraditions are
made possible with bilateral and/or regional treaties. Pursuant to the extradition treaty that the United States
has with Israel, for example, the administrator of Card Planet was arrested at an airport near Tel Aviv
and subsequently extradited to the United States from Israel, after having lost several appeals to prevent
his extradition.396
Extradition is governed by the domestic law of the States concerned, as well as any applicable bilateral or
multilateral treaties. Article 16, paragraph 4, of the Organized Crime Convention provides a legal basis for
extradition in respect of offences covered by that article in cases where there is no extradition treaty between
the States. Instruments governing extradition determine, among other things, the conditions for extradition
and any mandatory or discretionary grounds for refusal. Dual criminality is generally a prerequisite for
extradition; the aim is to ensure that the State in the territory of which a person is present will not extradite
him or her unless the offence for which the person is wanted is qualified as a crime in both States.397
UNODC, Legislative Guide for the Implementation of the United Nations Convention against Transnational Organized Crime,
397
126
chapter VI. Relevant procedural issues
Some national laws concerning cybercrime expressly address extradition. A case in point is the Cybercrime
and Computer Related Crimes act of Botswana, adopted in 2007. Article 29 of the act holds that an offence
under the act shall be considered to be an extraditable crime for which extradition may be granted or
obtained under the Extradition Act, 1990. Without extradition treaties, a country has no obligation to extra-
dite a wanted fugitive to the requesting country. Nonetheless, even the existence of extradition treaties does
not guarantee that a wanted fugitive will be extradited to the country requesting the extradition.
The municipal court of Prague ruled on the proposal of the office of the public prosecutor regarding
the extradition of the complainant for two criminal prosecutions in different countries pursuant to
the Act on International Judicial Cooperation in Criminal Matters of Czechia, as amended. The
municipal court ruled that the extradition for both prosecutions was allowed and that the complain-
ant could, therefore, be extradited to the United States (to be prosecuted for unauthorized access
to systems and data) and to the Russian Federation (to be prosecuted for the theft of property over
the Internet within an organized criminal group). The municipal court held that the alleged acts that
were the subject of the prosecutions in the Russian Federation and the United States were consid-
ered crimes under Czech law. The municipal court also concluded that the due process rights of the
complainant would be respected in both countries. From the materials provided by the foreign
authorities, the municipal court held that the extradition was not prohibited under the Act on
International Judicial Cooperation in Criminal Matters.b According to the municipal court, the com-
plainant was a young, healthy man, and it could not be assumed that his extradition would cause
him disproportionate harm.
It is important to note that the complainant did not object to his extradition to the Russian
Federation. The complainant objected to his extradition to the United States. The municipal court
did not find any reason to object to the extradition of the complainant to the United States.
Furthermore, the municipal court held that the complainant’s objection to the extradition to the
United States, specifically, on the grounds that he would be subjected to a disproportionate pen-
alty were unfounded, especially since in the United States sentences for several crimes could be
served concurrently.
The complainant appealed the decision of the municipal court to the high court in Prague. After
reviewing the decision of the municipal court and the evidence presented by the complainant, the
high court rejected the appeal and similarly found that there were no grounds for prohibiting the
extradition of the complainant. The high court echoed many of the conclusions of the municipal
court, concluding that there were no facts presented that illustrated the risk of human rights viola-
tions and disproportionate sentencing of the complainant if he was to be extradited to the United
States. With regard to the latter, the high court rejected the complainant’s argument that he was at
risk of receiving a penalty of up to 54 years’ imprisonment in the United States. In rejecting this
claim, the high court noted that the penalty that he could receive for the alleged crimes ranged
from 12 to 14 years of imprisonment.
127
DIGEST OF CASES
The Constitutional Court held that the decisions of the municipal court and the high court met con-
stitutional requirements. The Court held that Czechia was obligated to comply with its international
obligations in the field of criminal law, unless other stronger international obligations (usually in
the field of protection of human rights) or the basic values of the Czech constitutional order took
precedence. The task of the courts in proceedings under section 95 of the Act on International
Judicial Cooperation in Criminal Matters was, in essence, to determine whether the request for
extradition met the basic requirements of this Act and whether extradition was not hindered by any
legal obstacle. The Constitutional Court concluded that the municipal court and the high court had
fulfilled this task. The Constitutional Court also held that differences in the approach of countries
with respect to criminal penalties were not in themselves grounds for non-compliance with inter-
national obligations, as long as the penalties and the treatment of offenders were in line with
human rights obligations. Ultimately, the Constitutional Court ruled that the constitutional com-
plaint of the applicant was manifestly unfounded.
When Y.A.N. was extradited to the United States and tried by a jury, he received a sentence of
7 years and 4 months of imprisonment for his offending.c
For more information on this case, see UNODC, SHERLOC case law database, Case No. CZEx002.d
a
United States Attorney’s Office, Northern District of California, “Russian hacker sentenced to over 7 years in prison for
hacking into three Bay Area tech companies”, press release, 30 September 2020. For information about the case and charges
against the defendant, see United States District Court, Northern District of California, United States of America v. Yevgeni
Nikulin, Case No. 16-CR-0440-WHA, Indictment, 20 October 2016. of an individual to a foreign country.
b
This Act includes criteria that would prohibit the extradition of an individual to a foreign country.
c
HHe was sentenced for selling stolen usernames and passwords, in violation of Title 18, section 1029 (a)(2), of the United
States Code; installing malware on protected computers, in violation of Title 18, section 1030 (a)(5); conspiracy, in violation of
Title 18, section 371; computer intrusion, in violation of Title 18, section 1030 (a)(2)(C); and aggravated identity theft, in violation
of Title 18, section 1028A (1) (United States Attorney’s Office, Northern District of California, “Russian hacker sentenced to over
7 years in prison”).
d
Available at https://sherloc.unodc.org/.
398
United States District Court, District of Maryland, United States of America v. Eric Eoin Marques, Case No. TDC-19-200,
Plea Agreement, 28 January 2020.
399
Ibid.
400
United States District Court, Central District of California, United States of America v. Su Bin, Case No. SA CR 14-131,
Plea Agreement, 22 March 2016, pp. 17–18 (SHERLOC case law database, Case No. USAx244).
128
chapter VI. Relevant procedural issues
be followed. Article 18 of the Organized Crime Convention provides for the establishment of a comprehen-
sive regime for mutual legal assistance. In paragraph 3 of article 18, it is stated that mutual legal assistance
to be afforded in accordance with that article may be requested for any of the following purposes:
(a) Taking evidence or statements from persons;
(b) Effecting service of judicial documents;
(c) Executing searches and seizures, and freezing;
(d) Examining objects and sites;
(e) Providing information, evidentiary items and expert evaluations;
(f) Providing originals or certified copies of relevant documents and records, including government,
bank, financial, corporate or business records;
(g) Identifying or tracing proceeds of crime, property, instrumentalities or other things for eviden-
tiary purposes;
(h) Facilitating the voluntary appearance of persons in the requesting State party;
(i) Any other type of assistance that is not contrary to the domestic law of the requested State party.
Mutual legal assistance can be denied for several reasons, including if one or more of the conditions for
mutual legal assistance are not met and/or compliance with the request would violate human rights obliga-
tions.401 In the absence of mutual legal assistance treaties, agreements or conventions that can be used in lieu
of such treaties and agreements, mutual legal assistance can be provided if reciprocity is guaranteed by the
requesting country.402
During the investigation and prosecution of the case, S.S. could not be located by Brazilian authorities.
S.S. became aware of the criminal proceedings against him when he was in Germany. He subsequently
hired a lawyer, pleaded not guilty and argued that Brazilian courts had no jurisdiction over the case.
Under Brazilian criminal procedure, a defendant’s testimony is compulsory (with few exceptions), even
if it only concerns an affirmation to remain silent. Because S.S. was not in Brazil, a letter rogatory was
used to inform him of the criminal case and to obtain his testimony pursuant to article 368 of the Code
of Criminal Procedure of Brazil.a Ultimately, S.S. was not tried in a Brazilian court – not because Brazil
did not have jurisdiction, but because a trial in Germany would be more efficient.
401
See, for example, article 2 of the European Convention on Mutual Assistance in Criminal Matters; article 25, paragraph 4,
of the Council of Europe Convention on Cybercrime; article 4 of the Economic Community of West African States Convention on
Mutual Assistance in Criminal Matters; UNODC Teaching Modules, Cybercrime, Module 3: legal frameworks and human rights,
“International and regional instruments”; Module 7: international cooperation against cybercrime, “Formal international cooperation
mechanisms”; and UNODC Teaching Modules, Organized Crime, Module 11: international cooperation to combat transnational
organized crime, “Mutual legal assistance”. Available at sherloc.unodc.org/cld/en/education/tertiary/index.html.
402
See UNODC Educational Modules, Cybercrime, Module 7: international cooperation against cybercrime, “Formal interna-
tional cooperation mechanisms”; and UNODC Teaching Modules, Organized Crime, Module 11: international cooperation to combat
transnational organized crime, “Mutual legal assistance”. Available at sherloc.unodc.org/cld/en/education/tertiary/index.html.
129
DIGEST OF CASES
Like S.S., one of the defendants (O.F.G.) appealed his conviction, claiming that the websites were por-
nographic and that no international treaty existed between Brazil and Germany regarding the mainte-
nance of pornographic websites. The court of appeals rejected this claim, arguing that his conviction,
which was supported by evidence, was not for maintaining pornographic websites but for facilitating
prostitution and international trafficking in persons for the purpose of sexual exploitation.b He received
a sentence of 10 years and 6 months of imprisonment for international trafficking in persons for the
purpose of sexual exploitation and facilitating prostitution or other forms of sexual exploitation, among
other crimes. Other members of the criminal organization were sentenced for the same crimes.c
For further information about this case, see UNODC, SHERLOC case law database, Case No. BRA004.d
a
Article 368 of the Code of Criminal Procedure of Brazil holds that “If the accused is abroad, in a known place, he will be
summoned by letter rogatory…”.
b
Brazil, Tribunal Regional Federal da 5a Região, Apelação Criminal 5492-CE, 5a Região da TRF (2004.81.00.018889-0).
c
F.S.M. received a sentence of 11 years and 10 months of imprisonment for those crimes, and F.C.L.O. received a sentence
of 8 years and 9 months of imprisonment, as well as being charged with an offence relating to child sexual abuse material (see
UNODC SHERLOC case law database, Case No. BRA056. Available at https://sherloc.unodc.org/).
d
Available at https://sherloc.unodc.org/.
403
UNODC, Legislative Guide for the Implementation of the United Nations Convention against Transnational Organized Crime,
p. 175.
130
chapter VI. Relevant procedural issues
Denmark and to pay taxes. To obtain the identification number, the victims provided their authentic
Romanian identification documents along with fake employment contracts and home addresses.
Members of the organized criminal group used the identifying information of the victims, including
their Danish personal identification numbers, to perpetrate a wide variety of illicit activities both
online and offline (credit card fraud, tax fraud, etc.), as well as to create new companies to perpe-
trate some of the illicit activities. The defendants had victims open up bank accounts and obtain
debit cards, credit cards and loans, in addition to having the victims turn over their identity docu-
ments and data to the defendants, which they used, unbeknown to the victims, to perpetrate various
forms of fraud. The defendants would accompany victims to establishments such as banks and
stores and would speak on behalf of the victims (since the victims did not know the language) and
would have the victims sign documents that they could not read and could not understand. The
victims never actually worked in the jobs they were promised. The victims were provided short-
term work assignments by the defendants or they worked for the defendants for no payment or a
very modest payment.
This case involved three members of the group. For the crimes perpetrated by the three defend-
ants, their sentences ranged from 3 to 8 years of imprisonment. These defendants were not Danish
citizens and were deported from Denmark and banned from re-entering the country.
This case highlights successful cross-border police cooperation in a case involving cyber organized
crime. In addition to showing the successful cooperation between law enforcement agencies in
two countries (Denmark and Romania), this case involved the creation of a multidisciplinary
team that worked together on the case. The team included a Danish non-governmental organiza-
tion (the Centre against Human Trafficking), the Danish Immigration Service and a tax agency
(Skattestyrelsen), as well as police and prosecutors from Denmark and Romania.
4. Joint investigations
Another form of international cooperation is a joint investigation. Agreements or arrangements between
countries are made to enable and facilitate the creation of joint investigative bodies.404 When these agree-
ments and arrangements are absent, joint investigations may be conducted on a case-by-case basis.405
The Legislative Guide for the Implementation of the United Nations Convention against Transnational
Organized Crime includes two models for joint investigations:
(a) The first model identified consists of parallel, coordinated investigations with a common goal,
assisted by a liaison officer network or through personal contacts and supplemented by formal mutual legal
assistance requests in order to obtain evidence. The officials involved may be “non-co-located” and be able
to work jointly on the basis of long-standing cooperative practices and/or existing mutual legal assistance
legislation depending on the nature of the legal systems or systems involved;
(b) The second model consists of integrated joint investigation teams with officers from at least two
jurisdictions. These teams can be further divided and characterized as either passive or active. An example
of a passively integrated team would be the situation where a foreign law enforcement officer is integrated
with officers from the host State in an advisory or consultancy role or in a supportive role based on the
provision of technical assistance to the host state. An actively integrated team would include officers from
at least two jurisdictions with the ability to exercise operational powers (equivalent or at least some powers)
under host State control in the territory or jurisdiction where the team is operating.406
404
See article 19 of the Organized Crime Convention.
405
Ibid.
406
UNODC, Legislative Guide for the Implementation of the United Nations Convention against Transnational Organized Crime,
para. 596. For further information, see UNODC, Model Legislative Provisions against Organized Crime (Vienna, 2012), pp. 87–93.
131
DIGEST OF CASES
There are certain legal and practical issues associated with joint investigations, including trust between law
enforcement agencies, differing criminal procedural issues and rules of evidence, and/or the absence of
agreement on organization, roles, responsibilities, leads and supervision in the joint investigation and/or
mechanisms for resolving conflicts.407
United States of America v. Bryan Connor Herrell, Case No. 1:17 CR00301
(E.D. California, 2 September 2020) and United States of America v. Ronald L.
Wheeler III, Case No. 1:17-CR-377 (N.D. Georgia, 15 November 2017)
(United States of America)
AlphaBay and another major darknet market, Hansa Market, were shut down following a joint
investigation involving the FBI, the Drug Enforcement Administration of the United States, the
national police of the Netherlands and other European law enforcement agencies acting through
Europol.e The national police of the Netherlands had taken over Hansa Market and had monitored
and run the site unbeknown to the users, enabling the police to identify users and disrupt illicit
activity on the site. AlphaBay was shut down while the national police were running Hansa Market.
The coordinated shutting down of AlphaBay enabled the national police to obtain information iden-
tifying the users from AlphaBay who had joined Hansa. Once that information was collected, Hansa
Market was shut down and its seizure by law enforcement agencies was made public.
For more information on this case, see UNODC, SHERLOC case law database, Case No. USAx191.f
a
United States District Court, Eastern District of California, United States of America v. Bryan Connor Herrell, Case No. 1:17-
CR00301, Indictment, 2 September 2020.
b
Ibid.; United States Attorney’s Office, Eastern District of California, “Colorado man pleads guilty to racketeering charges
related to darknet marketplace AlphaBay”, press release, 28 January 2020.
c
United States District Court, Northern District of Georgia, United States of America v. Ronald L. Wheeler III, Case No. 1:17-
CR-377, Criminal Information, 15 November 2017.
d
United States Attorney’s Office, Northern District of Georgia, “AlphaBay spokesperson sentenced to federal prison”, press
release, 1 August 2018.
e
Europol, “Massive blow to criminal dark web activities after globally coordinated operation”, press release, 20 July 2017.
f
Available at https://sherloc.unodc.org/.
407
UNODC, Legislative Guide for the Implementation of the United Nations Convention against Transnational Organized Crime,
para. 597.
132
CHAPTER VII.
CONCLUSIONS AND
LESSONS LEARNED
DIGEST OF CASES
The present digest shows how criminal justice systems throughout the world have responded to cyber
organized crime by analysing concluded judicial decisions from more than 20 jurisdictions. The research
for this digest predominantly involved a review of primary sources, supplemented by secondary sources.
The cases referred to in the digest are not the only ones that concern the subject of this digest. The cases
included were chosen because of (a) their relevance; (b) the substantive and procedural elements of cyber
organized crime that were covered; and (c) the need to ensure that a variety of jurisdictions were repre-
sented in the digest. Accordingly, the findings of this digest are not generalizable because the cases included
in the digest cannot be considered a representative sample of all cases involving cyber organized crime in
all countries. Nevertheless, the cases included in the digest may help to shed some light on a largely
unknown and understudied form of cybercrime. This last chapter provides concluding remarks and lessons
learned from the cases analysed in the digest.
Overall, cases of cyber organized crime were not easily identifiable across jurisdictions. The identification
of such cases is challenging because the cases are not recorded as cyber organized crime and perpetrators
of these crimes may not be charged with and/or convicted of organized crime and/or participation in an
organized criminal group. Research on cyber organized crime is thus hampered by the fact that the concept
of cyber organized crime is not frequently deployed in such cases, making the cases harder to identify and
analyse. Although the cases included in this digest were not prosecuted and adjudicated as cyber organized
crime, they were identified as a form of cyber organized crime through a careful, time-consuming review of
court documents. The language limitations of the researchers and drafters working on the digest represented
a challenge to efforts to identify cases of cyber organized crime. An additional challenge was the lack of
access to publicly available court documents in many jurisdictions.
While the digest predominantly includes cases that involved participation in an organized criminal group,
there were some cases where cybercrime was perpetrated by an organized criminal group that operated
exclusively online, operated both online and offline, or utilized only the Internet and digital devices to facil-
itate the crimes. To a lesser extent, there were cases that met the definition of cyber organized crime but the
court documents mentioned neither an organized criminal group nor participation in an organized criminal
group in the analysis of the cybercrimes.
Most of the court documents analysed for this digest did not provide enough information to determine the
structure of cyber organized criminal groups, particularly whether such groups could be classified as
swarms, hubs, clustered hybrids and/or extended hybrids. The most difficult structure to identify in the
court documents was a swarm. More information is needed about the structure of cyber organized criminal
groups and even the roles of individuals within those groups.408 When available, critical procedural infor-
mation relating to the investigation and prosecution of cyber organized crime was also found in affidavits,
criminal information, complaints and indictments, as well as in requests for extradition. Information about
the gender dimensions of cyber organized crime was also limited and was largely based on the cases of
cyber organized crime that were identified. The information provided in this digest about the gender dimen-
sions of cyber organized criminal groups and cyber organized crime are not generalizable. Gender informa-
tion about victims was not often identified in the court documents of the cases in the digest, exceptions
being the cases that involved child sexual exploitation and abuse, trafficking in persons and, to a lesser
extent, romance scams and sextortion.
It would be useful to receive such information about the structures and organization of cyber organized
criminal groups and the roles of individuals within those groups, as well as the gender of participants in
cyber organized crime and victims of cyber organized crime, from criminal justice professionals through
court documents. This information would enable the identification of trends and patterns that could be
shared with criminal justice agencies around the world to help them improve their efforts to detect, investi-
gate, prosecute and adjudicate cyber organized criminal groups and those who participate in cyber organ-
ized crime. This information would also provide criminal justice professionals with a better understanding
The limited information that was identifiable about the structure and roles of cyber organized criminal groups were primarily
408
(but not exclusively) found in United States court documents (i.e., criminal complaints and indictments).
134
chapter VII. Conclusions and lessons learned
of cyber organized criminal groups, their tactics, targets, techniques, tools, members, associates and meth-
ods of operation, as well as the ways in which these groups evolve in response to countermeasures.
In the cases included in this digest, variations were observed with respect to sentences for similar offences
across and even within jurisdictions. These variations were also observed between different offences.
A case in point were sentences for offences relating to child sexual exploitation and abuse. In some juris-
dictions the penalties were quite severe, while in others the penalties were low, depending on the type of
offences involving child sexual exploitation and abuse.409 Moreover, in one jurisdiction, perpetrators of a
romance scam received a more severe penalty than perpetrators of child sexual exploitation and abuse, both
within the country and outside of that country.
Furthermore, the cases in this digest revealed that international cooperation, harmonized approaches to the
investigation and prosecution of cyber organized crime, as well as the existence of sufficient national
human, technical and economic resource capacities to investigate and prosecute cyber organized crime,
played a critical role in the successful adjudication of cyber organized crime. In view of that, attention needs
to be paid to the deficit in national capacities to investigate, prosecute and adjudicate cyber organized crime.
This would enable more jurisdictions to take a leading role in prosecuting offences involving cyber organ-
ized crime.
Ultimately, the findings of the digest illustrate the need to harmonize approaches with respect to the collec-
tion and recording of information relating to cyber organized crime in court and other documents across
jurisdictions, as well as the need to train criminal justice professionals on cyber organized crime and the
ways to successfully detect, investigate, prosecute and adjudicate cyber organized crime, cyber organized
criminal groups and participation in cyber organized crime. It is hoped that the digest will lead to the col-
lection and recording of information and the training of criminal justice professionals on cyber organized
crime, as well as future research on cyber organized crime, which will help to inform policymakers and
other stakeholders regarding the courses of action to be taken to reduce, control, prevent and/or mitigate this
form of cybercrime.
409
See, for example, Argentina, Tribunal Oral Federal de Jujuy, Causa FSA 8398/2014/TO1; Costa Rica, Tribunal Penal del Tercer
Circuito Judicial de San José, Causa penal número 15-001824-0057-PE & Causa Penal número 19-000031-0532-PE (Operación
R-INO); Canada, R v. Philip Michael Chicoine [2017] S.J. No. 557, 2017 SKPC 87; United States of America v. Caleb Young, Case
No. 18-20128, 11 May 2018; United States of America v. Dylan Heatherly, No. 19-2424 and United States of America v. William
Staples, No. 19-2932; United States of America v. John Doe #1, Edward Odewaldt, et al., Case No. 10-CR-00319, 16 March 2011;
Republic of Korea, Seoul Central District Court (Criminal Department I-I), 2018NO2855, 2 May 2019 (Welcome to video); Australia,
R v. Mara [2009] QCA 208; Germany, LG Limburg, Urteil vom 07.03.2019, 1 KLs – 3 Js 73019/18.
135
ANNEX
DIGEST OF CASES
ANNEX
Australia
Hew Raymond Griffiths v. United States of America, 143 FCR 182 (2005), 2005 WL 572006
R v. Mara [2009] QCA 208
Belgium
Tribunal correctionnel d’Anvers, Antwerpen, 2 mai 2016
Brazil
Apelação Criminal 5492-CE, 5a Região da TRF (2004.81.00.018889-0)
Canada
R v. Kalonji, 2019 ONCJ 341
R v. Philip Michael Chicoine [2017] S.J. No. 557, 2017 SKPC 87
R v. Pitts, 2016 NSCA 78
R v. Vachon-Desjardins, 2022 ONCJ 43
Chile
Fiscalía Metropolitana Sur, Chile. Rol Único de Causa No.1700623543-3 (Zares de la Web)
China
Hong Kong
HKSAR v. Chan Pau Chi [2019] HKEC 1549
Costa Rica
Tribunal Penal del Tercer Circuito Judicial de San José, Causa penal número 15-001824-0057-PE &
Causa Penal número 19-000031-0532-PE (Operación R-INO)
Czechia
ÚS 530/18 ze dne 27. 3. 2018
Denmark
Danmark B(R), ref. 9-3441/2015, domfældelse 14 December 2015
138
annex
Dominican Republic
Segundo Juzgado de Instrucción del Distrito Nacional – Proceso No. 058-13-00719
Segundo Tribunal Colegiado De la Cámara Penal del Juzgado de Primera Instancia del Distrito Nacional,
Sentencia penal núm. 249-04-2021-SSEN-00225
El Salvador
Tribunal de Sentencia de Santa Tecla, 139-1U-2018
Fiji
State v. Naidu et al [2018] FJHC 873
France
Cour de cassation, chambre criminelle, 21 mars 2012, 11-84437
TGI Lille, 7e ch. corr., jugement du 29 janvier 2004
Tribunal de grande instance de La Roche-sur-Yon, 24 septembre 2007
Tribunal de grande instance de Paris, 13e chambre correctionnelle, 20 novembre 2018
Germany
BGH, Beschluss vom 06.07.2010, 4 StR 555/09
BGH, Beschluss vom 19.04.2011, 3 StR 230/10
BGH, Beschluss vom 31.05.2012, 2 StR 74/12
BGH, Beschluss vom 30.08.2016, 4 StR 194/16
BGH, Beschluss vom 15.01.2020, 2 StR 321/19
LG Bonn, Urteil vom 07.07.2009, 7 KLs 01/09
LG Duisburg, Urteil vom 05.04.2017, 33 KLs – 111 Js 32/16 – 8/16
LG Hamburg, Urteil vom 21.03.2012, 608 KLs 8/11
LG Karlsruhe, Urteil vom 19.12.2018, 4 KLs 608 Js 19580/17
LG Leipzig, Urteil vom 14.06.2012, 11 KLs 390 Js 191/11
LG Limburg, Urteil vom 07.03.2019, 1 KLs - 3 Js 73019/18
LG München, Urteil vom 07.06.2017, 19 KLs 30 Js 18/15
Ghana
Republic v. Mohammed Libabatu, Charles Mensah & Nurudeen Alhassan (2016)
Republic v. Michael Asamoah &Anthony Ogunsanwo Olawole (2019)
India
Rajesh and others v. State of Rajasthan, Division Bench Appeal No. 178, 122 and 123 / 2016
State of Maharashtra v. Opara Chilezien Joseph
Italy
Cassazione penale, sezione III, 12 Febbraio 2004, No. 8296, & Tribunale di Siracusa,
19 Luglio 2012, No. 229
Cass., 31 Marzo 2017, No. 43305
Cassazione penale, sezione VI, sentenza No. 11356, 8 Novembre 2017
Cassazione penale, sezione feriale, sentenza No. 50620, 12 Settembre 2013
139
DIGEST OF CASES
Mexico
Tribunal de Enjuiciamiento del Distrito Judicial Morelos – número de juicio 38/2020
Nigeria
Federal Republic of Nigeria v. Harrison Odiawa, Suit No ID/127c/2004
Philippines
Regional Trial Court of Misamis Oriental, 10th Judicial Region, Branch 41, CRIM Case No. 2009-337
Republic of Korea
Seoul Central District Court (Criminal Department I-I), 2 May 2019, 2018NO2855
Rwanda
IKIZA RY’ URUBANZA RP/ECON 00002/2020/TGI/GSBO (Forkbombo)
Samoa
Police v. Zhong [2017] WSDC 7
Senegal
Tribunal de grande instance hors classe de Dakar, 14 janvier 2020, 38/2020
Seychelles
R v ML & Ors Cr S 63/19 (2020)
Singapore
Public Prosecutor v. Law Aik Meng [2006] SGDC 243
Uganda
Gachev & Ors v. Uganda (Criminal Appeal 155 of 2013) [2016] UGHCCRD 4 (16 July 2016)
Uganda v. Ssentongo & 4 Ors (Criminal Session Case 123 of 2012) [2017] UGHCACD 1 (14 February
2017)
Uganda v. Sserunkuma & 8 Ors (HCT-00-CR-SC 15 of 2013) [2015] UGHCACD 4 (27 April 2015)
Uganda v. Nsubuga & 3 Ors (HCT-00-AC-SC 84 of 2012) [2013] UGHCACD 12 (3 April 2013)
Northern Ireland
Queen v. Paul Mahoney [2016] NICA 27, 2016 WL 03506240.
140
annex
141
DIGEST OF CASES
United States of America v. Paras Jha, Case No. 3:17-CR-00164 (D. Alaska, 5 December 2017)
United States of America v. Ijaz Khan, Case No. 17-4301 (4th Circuit 2018)
United States of America v. Alexander Konovolov et al., Case No. 2-19-CR-00104 (W.D. Pennsylvania,
17 April 2019)
United States of America v. Michael Lacey, James Larkin, Scott Spear, John “Jed” Brunst, Dan Hyer,
Andrew Padilla and Joye Vaught, 18 Cr. 422 (D. Arizona, 28 May 2018)
United States of America v. Liberty Reserve, Case No. 13-CR-368 (DLC) (S.D. New York, 23 September
2015)
United States of America v. Salvatore Locascio et al., 357 F. Supp. 2d 536 (2004)
United States of America v. Andrew Mantovani et al., Case No. 2:04-CR-0078 (D. New Jersey, 28 October
2004)
United States of America v. Eric Eoin Marques, Case No. TDC-19-200 (D. Maryland, 28 January 2020)
United States of America v. Hidalgo Marchan, Case No 1:15-CR-20471 (S.D. Florida, 23 June 2015)
United States of America v. Antwine Lamar Matthews, Malcolm Cooper, Andreika Mouzon, and Flossie
Brockington. Cr. No. 2:18-1024 (D. South Carolina, 14 November 2018)
United States of America v. Bogdan Nicolescu, Tiberiu Danet, and Radu Miclaus, Case No. 1:16-CR-00224
(N.D. Ohio, 8 July 2016)
United States of America v. Nienadov, No. 4:19 CR-365 (S.D. Tex. Mar. 29, 2021)
United States of America v. Yevgeni Nikulin, Case No. 16-CR-0440-WHA (U.S. District Court of Northern
California, 20 October 2016).
United States of America v. Adeyemi Odufuye and Stanley Hugochukwu, Case No. 3:16R232 (JCH),
Indictment (D. Connecticut, 20 December 2016)
United States of America v. Obinwanne Okeke, Case No. 4:19-mj-00116 (E.D. Virginia, 2 August 2019)
United States of America v. Beniamin-Filip Ologeanu, Case No. 5:19-CR-10, Superseding Indictment
(E.D. Kentucky, 6 February 2019)
United States of America v. Rakeem Spivey and Roselyn Pratt, Case No. 2:18-cr-0018 (D. South Carolina,
14 November 2018)
United States of America v. Vincent Ramos et al., Case No. 3:18-CR-01404-WQH (S.D. California,
15 March 2018)
United States of America v. Daniel Palacios Rodríguez, Alexandra Guzmán-Beato, Elvis Pichardo
Hernández, José David Reyes- González, Juan Rufino Martínez-Domínguez, and Fátima Ventura Pérez,
Case No. 1:19-MJ-286 (E.D. Virginia, 24 June 2019)
United States of America v. Aleksandr Andreevich Panin and Hamza Bendelladj, Case No. 1:11-CR-0557-
AT-AJB (N.D. Georgia, 26 June 2013)
United States of America v. Melissa Scanlan, Case No. 18-CR-30141-NJR-1 & Case No. 19-CR-30154-
NJR-1 (S.D. Illinois, 20 October 2019)
United States of America v. Aaron Michael Shamo, Drew Wilson Crandall, Alexandrya Marie Tonge,
Katherine Lauren Anne Bustin, Mario Anthony Noble, and Sean Michael Gygi, Case No.
2:16-CR-00631-DAK (D. Utah, 31 May 2017)
United States of America v. William Staples, Case No. 19-2932 (3d Circuit 2020)
United States of America v. Andre-Catalin Stoica et al., Case No. 5-18-CR-81-JMH (E.D. Kentucky,
5 July 2018)
United States of America v. Kristjan Thorkelson, Case No. 14-CR-27-BU-DLC (D. Mont., 10 December
2018)
United States of America v. Vladimir Tsastsin, Andrey Taame, Timur Gerassimenko, Dmitri Jegorov, Valeri
Aleksejev, Konstantin Poltev, and Anton Ivanov, Case No. 1:11-CR-00878 (S. D. New York, 14 October
2011)
United States of America v. Ross William Ulbricht, Case No. 15-1815 (2d Circuit 2017)
United States of America v. Sergiy Petrovich Usatyuk, Case No. 5:18-CR-00461-BO (E.D. North Carolina,
15 November 2018).
United States of America v. Joshua Aaron Vallance, Case No. 20 Cr. 08 (E.D. Kentucky, 28 May 2020)
142
annex
United States of America v. Gal Vallerius, 2018 U.S. Dist. LEXIS 85620
United States of America v. Ronald L. Wheeler III, Case No. 1:17-CR-377 (N.D. Georgia, 15 November
2017)
United States of America v. Wendell Wilkins, Jalisa Thompson, Tiffany Reed, Brandon Thompson and
Laben McCoy, Case No. 2-18-CR-101 (D. South Carolina, 14 November 2018)
United States of America v. Nathan Wyatt, Case No. 4:17CR00522 RLW/SPM (E.D. Missouri,
8 November 2017)
United States of America v. Eoin Ling Churn Yeng and Gal Vin Yeo Siang Ann, Case No. 3:16 CR 00090
(D. Oregon, 23 February 2016)
United States of America v. Caleb Young, Case No. 18-20128 (E.D. Michigan, 11 May 2018)
United States of America v. Tal Prihar and Michael Phan, Case No. 2-19-CR-00115-DWA
(W.D. Pennsylvania, 24 April 2019)
143
Vienna International Centre, P.O. Box 500, 1400 Vienna, Austria
Tel.: (+43-1) 26060-0, Fax: (+43-1) 263-3389, www.unodc.org
2210875