©2013
ONLINE INVESTIGATIONS
As the use of the Internet and mobile technologies, including smartphones, has grown rapidly in
recent years, so has the opportunity for computer-related crime. Unlawful activity can be
committed or facilitated online with criminals trading and sharing information, masking their
identity, gathering information on victims, and communicating with co-conspirators. Websites,
email, chat rooms, and social networks can all provide vital evidence in an investigation of
computer-related crime, and this session assists investigators in their efforts to curb such crime.
DR. STEPHEN HILL, PH.D., CIIP, ICTP
Managing Director
Snowdrop Consulting Ltd
Essex, United Kingdom
Dr. Stephen Hill is the Managing Director of Snowdrop Consulting Ltd, a company with the
aim of providing education and consultancy to the private and public sector in fraud risk
management, prevention/awareness, online investigations, and data security, including ISO27001
and the Data Protection Act.
Stephen spent 11 years working for a top 25 firm of accountants, heading the Fraud and
Forensic Group and leading an expert body advising clients on prevention, detection, and
recovery of fraudulent assets, working closely with the police, HMRC, and private sector.
He is a Trustee Director of the Fraud Advisory Panel, a registered charity that works to raise
awareness of fraud and financial crime and how to protect against it. Stephen chairs the Fraud
Advisory Panel’s Cybercrime Working Group with colleagues from the public, private, and third
sectors, and previously led its charity fraud research project that resulted in the report A Breach
of Trust.
He is also an Associate Member of the Association of Certified Fraud Examiners and an
honorary member on the steering committee of the London Fraud Forum.
Stephen specialises in e-crime and fraud awareness with over twelve years’ experience in
focusing on counter fraud, cyber fraud, not-for-profit fraud, and risk management. He is a
certified practitioner (CIIP) for IS027001, and has worked on a number of guides to fraud
detection data security and prevention for many small to medium enterprises (SMEs) and
charities.
©2013
He has developed and delivered a series of fraud prevention, data security, e-fraud, and
Internet Investigations and OSINT courses aimed at training UK police forces (including
Operation Podium in the buildup to the 2012 Olympics), private-sector fraud units, not-for-profit
organisations, and major world banks.
Stephen has written a book, Corporate Fraud: Prevention & Detection, published by
Bloomsbury Professional, with practical advice on all aspects of fraud and how to prevent it,
with the royalties going to the charity Victim Support.
He has also written for several well-known publications, including The Sunday Times,
“Accountancy Magazine,” “FS Focus,” “Third Sector,” “Charity Finance,” and “Solicitors
Journal,” and commented on Radio 5 and the BBC’s Real Story. Stephen has contributed to
many fraud and risk management publications, including CIMA’s Fraud Risk Management: A
Guide to Good Practice.
With a recent appointment as a Volunteer to the City of London Police Economic Crime
Directive, Stephen assists fraud investigators with online investigations.
“Association of Certified Fraud Examiners,” “Certified Fraud Examiner,” “CFE,” “ACFE,” and the
ACFE Logo are trademarks owned by the Association of Certified Fraud Examiners, Inc. The contents of
this paper may not be transmitted, re-published, modified, reproduced, distributed, copied, or sold without
the prior consent of the author.
ONLINE INVESTIGATIONS
2013 ACFE European Fraud Conference ©2013 1
NOTES The use of the Internet and mobile technologies, including
smartphones, has grown rapidly in recent years, as has the
opportunity for computer-related crime. Unlawful activity
can be committed or facilitated online with criminals
trading and sharing information, masking their identities,
gathering information on victims, and communicating with
co-conspirators.
However, the Internet also provides opportunities to fraud
investigators and their acquiring of vital digital intelligence.
The Internet by design is “public” with incredible amounts
of data available to anyone with a computer and a browser.
Today, fraud examiners have access to new and evolving
search engines, databases, open source tools, chat rooms,
blogs, online gaming communities, and social networks in
their efforts to curb crime.
The Internet and World Wide Web
The rise of the Internet offers new possibilities for fraud
examiners globally. The emergence of information
technology (e.g., portable devices, including tablets and
smartphones) has provided fraud examiners access to
information at a rate never before experienced in real time.
With over two billion Internet users worldwide, the level of
online activity is staggering and increasing exponentially,
especially in light of the social media revolution.
The Internet is a vast “interconnection of computer
networks” that spans the globe. It is comprised of millions
of computing devices that trade volumes of information.
Desktop computers, mainframes, tablets, smartphones,
video game consoles, and even the “smart” televisions are
connected to the Internet.
The Internet has had a relatively brief, but explosive,
history thus far. It grew out of an experiment begun in the
ONLINE INVESTIGATIONS
2013 ACFE European Fraud Conference ©2013 2
NOTES 1960s by the U.S. Department of Defense. The DOD
wanted to create a computer network that would continue
to function in the event of a disaster, such as a nuclear war.
If part of the network were damaged or destroyed, the rest
of the system still had to work. That network was
ARPANET, which linked U.S. scientific and academic
researchers, and is the forerunner of today’s Internet.
The Internet houses many layers of information, with each
layer dedicated to a different kind of documentation. These
different layers are called protocols. The most popular
protocols are the World Wide Web, FTP, Telnet,
Gopherspace, instant messaging, and email.
How Does the Web Work?
The World Wide Web, or WWW, is the name given in
1990 by Tim Berners-Lee of CERN to his proposal for
an Internet-based hypertext system. He wrote the first
WWW client and WWW server, and defined standards
such as URL, HTML, and HTTP while working at
CERN. This would link together behind a single, easy-
to-use interface the various information resources
spread around the Internet, and accessed using many
different systems and protocols.
In 1965, Ted Nelson devised the invention that brings
everything into a single Web using the now familiar
tool known as hypertext. In hypertext, any word can be
associated with a link that points to a specific piece of
information. To be able to display hypertext, Tim
Berners-Lee developed a description language called
Hypertext Markup Language, or HTML for short. The
basic idea behind HTML is to describe the structure of
a document, for example, by saying which part of the
text is a heading, emphasise words or a quotation, and
allow for the way these are finally displayed.
ONLINE INVESTIGATIONS
2013 ACFE European Fraud Conference ©2013 3
NOTES The World Wide Web is the most popular portion of the
Internet. The Web is viewed through Web browser
software such as Internet Explorer, Firefox, and Safari,
which allows access to Web pages stored on servers
around the globe.
Understanding the Web Addresses (URL)
The World Wide Web has been described as a network
of electronic files stored on computers (servers) all
around the world. Hypertext links these resources
together. Uniform Resource Locators, or URLs, are the
addresses used to locate these files. The information
contained in a URL gives the ability to jump from one
location on the Web to another. Most Web browsers
allow you to type in a URL to access a particular
document or service. When you click on a hypertext
link in an HTML document, your Web browser is
actually sending a request to download a file stored on a
remote computer (server).
What Does a Typical URL Look Like?
Here are some examples:
http://www.acfe.com—The homepage for the
ACFE
https://www.paypal.com/uk/webapps/mpp/home—
A secure version of http using SSL
ftp://rtfm.mit.edu/pub—A directory of files
available for downloading
http://blogs.reuters.com/soccer—A blog or weblog
from the Reuters news agency
The first part of a URL (before the two slashes) tells
you the type of resource or method of access at that
address. For example:
http—hypertext document or directory
gopher—gopher document or menu
ONLINE INVESTIGATIONS
2013 ACFE European Fraud Conference ©2013 4
NOTES ftp—file available for downloading or a directory of
such files
news—newsgroup
telnet—computer system that you can log into over
the Internet
WAIS—database or document in a Wide Area
Information Search database
file—file located on a local drive (hard drive)
The second part of a URL is typically the address of the
computer where the data or service is located.
Additional parts may specify the names of files, the port
to connect to, or the text to search for in a database.
Most of the URLs start with http, which stands for
Hypertext Transfer Protocol. Http is the method by
which HTML files are transferred over the Web. Here
are some other important things to know about URLs:
A URL usually has no spaces.
A URL always uses forward slashes.
If you enter a URL incorrectly, your browser will
not be able to locate the site or resource you want.
You can find the URL behind any link by passing
your mouse cursor over the link. The pointer will
turn into a hand and the URL will appear in the
browser’s status bar, usually located at the bottom
of your screen.
Tools for Effective Searching
The first step to Internet research is to have a thorough
understanding of the search protocols offered by the
various Internet search engines.
Google, Yahoo, and Bing are only three of the several free
search engines available for investigative Internet research;
however, fraud examiners should not rely exclusively on
ONLINE INVESTIGATIONS
2013 ACFE European Fraud Conference ©2013 5
NOTES one search engine. For best results, experts recommend
using multiple search engines, as each search engine only
retrieves those pages to which it is indexed, and no Internet
search engine is indexed to all available information. Fraud
examiners may wish to choose a “metasearch” site, which
allows queries to be submitted to multiple search engines
simultaneously. Alternatively it is worth considering setting
up an automated search such as Google Alerts.
Search Engines (Index)
Databases used by search engines are made by “robots”
or “spiders” that automatically map the Web by
following the links between sites. These robots or
spiders read the Web pages and put the text (or parts of
the text) into a large database or index that you can then
access. None of them cover the whole Internet; Google,
the world’s largest index of the Internet, only
catalogues 8 percent of the World Wide Web. Other big
search engines include Bing, Ask, and DuckDuckGo.
Search Directories
Search directories are hierarchical databases with
references to websites.
The websites that are included are hand-picked by
humans and classified according to the rules of that
particular search service. Yahoo is the leader of search
directories. About and Alive are also very popular.
Pandia Plus Directory (Pandia PowerSearch) is based
on the Open Directory, a catalogue made by enthusiasts
from all over the world.
Directories are very useful when you only have a
general notion of what you are looking for. The first
page normally gives you the most general categories
(e.g., Government or Education).
ONLINE INVESTIGATIONS
2013 ACFE European Fraud Conference ©2013 6
NOTES Click your way down the hierarchy to the right
category, select the website you find most interesting,
and start researching!
Metasearch
Metasearch engines are search engine tools that pass
queries on to many other search engines or directories,
and then summarise all the results in one handy
interface.
A metasearch engine, such as Dogpile, collects and
sorts the hits, takes out duplicates, and presents the end
result in a simple format.
Popular metasearch websites include Scour, IXQuick,
and Browsys.
Deep Web
The Deep Web, or Invisible Web, is the set of
information resources on the World Wide Web not
reported by normal search engines.
Deep Web content includes information in private
databases that are accessible over the Internet but not
intended to be crawled by search engines. For example,
some universities, government agencies, and other
organisations maintain databases of information that
were not created for general public access. Other sites
may restrict database access to members or subscribers.
The term Deep Web was coined by BrightPlanet, an
Internet search technology company that specialises in
searching deep Web content. Although some of the
content is not open to the general public, BrightPlanet
estimates that 95 percent of the Deep Web can be
accessed through specialised search.
ONLINE INVESTIGATIONS
2013 ACFE European Fraud Conference ©2013 7
NOTES Deep Web search engines include CompletePlanet,
Surfwax, and Pipl.
Specialist Search Tools
There are other tools available to fraud examiners, and
it depends upon what it is they are looking for as to
which site to use. Here is a selection of useful links to
add to your Internet investigation toolbox:
Silo Breaker: www.silobreaker.com
KGB People: www.kgbpeople.com
Spokeo: www.spokeo.com
Verify Email Address: verify-email.org
YouTube: www.youtube.com
Flickr: www.flickr.co.uk
Yippy: yippy.com
The Wayback Machine: www.archive.org
Social Media Search Tools
Social media has opened up numerous opportunities to
the fraud examiner and is a key component to profiling
the subject of an investigation. The pool of information
about each individual can form a distinctive social
signature.
Twitter, Facebook, and LinkedIn, to name but a few,
have embedded themselves in people’s lives. Posting to
walls, tweets, and video and image updates is emerging
as a new trove of intelligence for the fraud examiner.
Useful links for social media intelligence gathering
include:
www.socialmention.com
whostalkin.com
www.kurrently.com
fbsearch.us
tweetalarm.com
ONLINE INVESTIGATIONS
2013 ACFE European Fraud Conference ©2013 8
NOTES tweetcharts.com
www.weknowwhatyouredoing.com
www.tweetdeck.com/desktop
www.twitscoop.com
www.facesaerch.com
monitter.com
Note: There are limitations to the information you can
access on a social network due to privacy settings, and
anonymity and legal advice may be required before
using social media evidence against an individual.
Open Source Intelligence
Open source intelligence (OSINT) is a form of
intelligence collection management that involves
finding, selecting, and acquiring information from
publicly available sources and analysing it to produce
actionable intelligence.
In the intelligence community (IC), the term open refers
to overt, publicly available sources (as opposed to
covert or classified sources).
OSINT includes a wide variety of information and
sources:
Media
Government sources
Academic and professional sources
Web-based communities
Useful Links
osint.deepwebtech.com/categories.html
www.intelligencesearch.com
www.onstrat.com/osint
www.osint.org.uk
opendatasearch.org
ONLINE INVESTIGATIONS
2013 ACFE European Fraud Conference ©2013 9
NOTES publicdata.eu
www.eurosint.eu/
rr.reuser.biz/
How to Trace an Email Address
Learn How to Trace an Email Address
Trace an email address in the most popular programs
such as Microsoft Outlook, Hotmail, Yahoo, Gmail,
and AOL by finding the header.
What is an Email Header?
Each email you receive comes with headers. The
headers contain information about the routing of the
message and the originating Internet Protocol address
of the message. Not all electronic messages you receive
will allow you to track them back to the originating
point and, depending on how you send messages,
determines whether they can trace an email address
back to you. The headers do not contain any personal
information.
At most, the results of the trace will show you the
origination IP and the computer name that sent the
email. After viewing the trace information, the
initiating IP can be looked up to determine from where
the message was sent. IP address location information
DOES NOT contain your street name, house number, or
phone number. The trace will most likely determine the
city and the ISP the sender used.
How Do I Get the Header to Start the Trace Email
Process?
Each electronic messaging program will vary as to how
you get to the message options. I will cover the basics
to start the trace … the rest is up to you.
ONLINE INVESTIGATIONS
2013 ACFE European Fraud Conference ©2013 10
NOTES Outlook—Right-click the message while it is in the
inbox and choose Message Options. A window will
open with the headers in the bottom of the window.
Windows Live—Right-click the correspondence
while it is in the inbox, choose Properties, then click
the Details tab.
GMail—Open the correspondence. In the upper
right corner of the email, you will see the word
Reply with a little down arrow to the right. Click the
down arrow and choose Show Original.
Hotmail—Right-click the message and select View
Message Source.
Yahoo!—Click the Actions dropdown menu and
select View Full Header.
AOL—Click Action, then View Message Source.
You can see that no matter the program, the headers are
usually just a right-click away.
I Have the Header, Now How Do I Start the Trace?
The next step to trace an email address is to find the
originating IP listed in the header. An easy way to read
the header of an email is to use the email header tool on
www.whatismyipaddress.com.
Simply copy the header information from the email and
paste it into the relevant box on the “what is my IP
address?” email header Web page.
Tracing an Internet Address to a Source
Just as every house has an address, every computer
connected to the Internet has an address. This is referred to
as an Internet Protocol (IP) address.
ONLINE INVESTIGATIONS
2013 ACFE European Fraud Conference ©2013 11
NOTES Identifying the Owner of a Website
There are a number of domain lookup tools available,
and in this example we are going to use
whois.domaintools.com.
Once on the website, enter in the domain name and
click on “Lookup.”
Once the Lookup search has been entered, you will be
able to identify who is registered as the owner of the
website.
The registration details lists a number of important
things—the registrant (can be an individual or a
company), the registrant’s address, who they registered
the website with (Registrar), and dates indicating
registration, renewal, and last updated.
Identifying the Hosting Provider of a Website
It is important to also identify the hosting provider (i.e.,
who runs the Web server where the website you are
investigating resides).
At the top of the page you are currently on, you will see
a series of tabs, including “Server Stats.”
Click on the Server Stats tab and you will see an IP
Address of the Hosting Provider. Click on the IP
Address to be able to identify the details of the Hosting
Provider, including key contacts.
Identifying Which Bodies Could Also Be Contacted
IANA (WWW.IANA.ORG)
The Internet Assigned Numbers Authority (IANA)
is a department of ICANN responsible for
coordinating some of the key elements that keep the
ONLINE INVESTIGATIONS
2013 ACFE European Fraud Conference ©2013 12
NOTES Internet running smoothly. Whilst the Internet is
renowned for being a worldwide network free from
central coordination, there is a technical need for
some key parts of the Internet to be globally
coordinated—and this coordination role is
undertaken by IANA.
Specifically, IANA allocates and maintains unique
codes and numbering systems that are used in the
technical standards (protocols) that drive the
Internet.
ICANN (WWW.ICANN.ORG)
To reach another person on the Internet, you have to
type an address into your computer—a name or a
number. That address has to be unique so computers
know where to find each other. ICANN coordinates
these unique identifiers across the world. Without
that coordination, we would not have one global
Internet.
ICANN was formed in 1998. It is a not-for-profit
partnership of people from all over the world
dedicated to keeping the Internet secure, stable, and
interoperable. It promotes competition and develops
policy on the Internet’s unique identifiers.
ICANN does not control content on the Internet. It
cannot stop spam and it does not deal with access to
the Internet. But, through its coordination role of the
Internet’s naming system, it does have an important
impact on the expansion and evolution of the
Internet.
ONLINE INVESTIGATIONS
2013 ACFE European Fraud Conference ©2013 13
NOTES Regional Bodies
The Internet is split into 5 regions—Africa, North
America, Asia-Pacific, Latin America/Caribbean, and
Europe/Middle East/Central Asia. Each region has a
regional internet registry (RIR) that has responsibilities
in regards to the Internet.
These RIRs and their contact email addresses are:
AfriNIC: [email protected]
ARIN: [email protected]
APNIC: [email protected]
LACNIC: [email protected]
RIPE NCC: [email protected]
Typically, these bodies are reluctant to get involved;
however, they can be a useful last course of action.
What to Look Out for in Terms of More Suspicious
Setups
Key indicators to look out for are:
Websites registered in one country but hosted in
another. This becomes more suspicious when the
registrant is in the UK but is hosted in Russia,
Eastern Europe, or Africa. Also, look out for typical
havens, such as Switzerland and Andorra.
Websites operating in the UK, aimed at a UK
market, but where the registered owner is based
outside of the UK.
Websites registered by a third-party company, and
therefore masking the real owner. Again, typically,
these third parties will be located in havens.
Websites with details that are obviously incorrect or
misleading.
ONLINE INVESTIGATIONS
2013 ACFE European Fraud Conference ©2013 14
NOTES Following the Money—Who Registered/Paid for the
Domain Registration?
Domain names are typically registered for a two-year
period and can only be renewed within a couple of
months of the expiry date. Some other domains can be
registered for longer periods, and are typically offered
at a discounted rate registered for five or ten years at a
time. Understanding how a domain registration has
been paid for could help the investigation.
Remember, hosting services and domain registration
requires a fee, so follow the money. In the domain
name entry, when you view the details of a domain
name entry in the list of your domain names, the User
ID of the billing contact will be shown. Click on the
domain name to see the details.
In some cases, the website you are investigating will
need to be maintained and updated, so the server log
maintained by the registrar will indicate how the “Web
Manager” accesses the site, providing you with more
vital digital evidence.
Protecting Your Privacy
Every time you surf the Internet, your IP address is publicly
visible to everyone on target network resources.
There are numerous Internet proxy servers offering
anonymous Web browsing capability (e.g.,
www.hidemyass.com and www.torprojectorg).
Accessing websites via these proxies hides your public IP
address from Web servers, helping to protect your identity
online. Remember, when using a proxy server, you give
them your ID.
ONLINE INVESTIGATIONS
2013 ACFE European Fraud Conference ©2013 15
NOTES Other Things to Consider When Protecting Yourself
Online
Browse the Internet safely by using a secure Web
browser such as Firefox, and always run the updates
when released.
Turn on your browser’s private mode, usually found
under Preferences, Tools, or Settings.
Use the privacy settings on social networks such as
Facebook, and use a strong password.
Clear out temporary Internet files, cache, and
history files (also monitor third-party cookies).
Use a search engine such as DuckDuckGo, which
distinguishes itself with a “We do not track”
feature.
Secure wireless networks, as unprotected Wi-Fi
(wireless) networks are vulnerable.
Do not broadcast your SSID (Service Set
IDentifier).
Enable WPA2 (Wi-Fi Protected Access).
Restrict access by MAC address (filtering) when
using a Wi-Fi network.
Do not auto-connect to open Wi-Fi networks.
Be careful which Wi-Fi hotspots you connect to.
Install firewalls onto your IT systems to prevent
outside parties from gaining access to information.
Keep anti-virus and anti-spyware software up-to-
date, and download the latest security updates.
Use strong passwords for online login, and always
ensure you are on a secure site (i.e., https) before
leaving any sensitive information.
Use encryption to protect information contained in
emails or stored on laptops or other portable devices
such as memory sticks.