D.A. Bragg Announces Cyber Crime Bureau Focused On Cutting-Edge Crimes And Complex Investigative Techniques


September 10, 2024

Evolving from the Previous Cybercrime and Identity Theft Bureau, CCB Focuses on Complex Cyber Crime, Using State-of-the-Art Investigative Tools

Manhattan District Attorney Alvin L. Bragg, Jr., today announced the creation of the Cyber Crime Bureau (“CCB”), an evolution of the Office’s longstanding cyber-crime practice tasked with the prosecution of computer crimes and cyber-enabled crimes. CCB utilizes complex investigative techniques and focuses on technically sophisticated and other “cutting edge” crimes which involve recent technological innovation and trends, such as the theft of cryptocurrency, SIM-swapping, computer and network intrusions, business email compromises, malware attacks, illicit dark-web vendors, and the use of Artificial Intelligence to facilitate criminal activity.

“Today, cases across the Office from the Trial Division to the Special Victims Division require a high level of cyber expertise,” said District Attorney Bragg. “Our ability to conduct blockchain analysis, perform forensic analysis on mobile devices, and much more is unique for a local prosecutor’s office, and critical to many of our investigations and prosecutions. With this evolution of the Cyber Crime Bureau, the Manhattan D.A.’s Office continues to lead the way in the investigation and prosecution of complex computer and cyber-enabled crimes.”

CCB’s techniques were highlighted in today’s indictment of DAVID OLIVIER, 56, for allegedly possessing at least four images of child sexual abuse. The four-count New York State Supreme Court indictment followed a CCB investigation that included complex blockchain analysis, and other investigative activity, to identify the individual who accessed and sent Bitcoin to a dark web site that displayed and offered for sale images of child sexual abuse.[1]

In August, the Office announced charges against MICHAEL LAUCHLAN, 36, for allegedly stealing from customers of Coin Dispute Network, his sham cryptocurrency asset recovery business, in another case involving extensive blockchain analysis. Since launching the investigation, the D.A.’s Office has spoken with more than 175 CDN customers – none of whom were able to recover any cryptocurrency using CDN. Investigators also traced approximately $14,000 of cryptocurrency belonging to CDN users that was transferred to CoinEx, a cryptocurrency exchange. In Spring 2024, the Cyber Crime Bureau executed a seizure order, and the funds were transferred from CoinEx to a wallet address in the Office’s control for the pendency of the investigation.

CCB has also prosecuted or assisted with investigations involving a major dark web drug trafficking ring, the use of cryptocurrency to provide financial support to terrorist groups operating in Syria, and a sophisticated $700,000 cryptocurrency investment scheme based out of Nigeria, among many others.

 

Cyber Crime Bureau

CCB investigates and prosecutes sophisticated computer crimes and cyber-enabled crimes, particularly those which may have an outsized impact on a large number of victims in New York, including websites involved in the distribution of stolen personal identifying information; illicit services, controlled substances, and other contraband; and money laundering. CCB also works to seize and return stolen funds and take down websites which enable illicit activity that occurs in New York and targets New Yorkers.

The use of cryptocurrency in connection with illicit activity is a priority of CCB because these digital assets are being used to obscure or launder proceeds of other crimes, such as computer trespass, identity theft and larceny, and to rapidly and anonymously move these criminal proceeds overseas. CCB has three dedicated cryptocurrency analysts and uses sophisticated software to analyze the blockchain to support the Office’s investigations and prosecutions of any offenses which involve cryptocurrency or other digital assets.

CCB houses the Office’s Cyber Intelligence Unit (“CIU”), which has played an important role in cases involving sophisticated international malicious cyber actors and transnational organized crime.  CIU collects and leverages strategic intelligence to support investigations and prosecutions of high-level dark web and other illicit activity targeting or harming Manhattanites, including large-scale payment card fraud, the purchase and sale of personal identifying information, ransomware campaigns, the sale of illicit substances and other contraband, hacking services, and money laundering.

CCB will continue to oversee the work of the High Technology Analysis Unit (“HTAU”), which houses the Office’s state-of-the-art digital forensic lab. HTAU staff conducts forensic analyses, pursuant to consent or a search warrant, on electronic devices seized in cases across the Office’s Investigation, Trial, and Special Victims Divisions. HTAU uses forensic hardware, software and industry-standard best practices to examine mobile devices, hard drives, computers, servers, cameras and other electronic devices, in a controlled laboratory setting. HTAU’s Cell Site Analysis Unit, which receives cell site data pursuant to search warrants served on telecommunications providers, conducts geospatial analysis and mapping of cell sites, and gives expert witness testimony in the grand jury and at trial. HTAU’s Cyber Response Team liaises with the Office’s prosecutors, investigators, and external law enforcement agencies to plan and execute the technical aspects of search warrants, assists with searches of vehicle telematic and infotainment units, and conducts other technical fieldwork such as incident response, malware analysis, and wireless assessments. HTAU staff includes data engineers who use programming and data science to enhance investigative and administrative functions by building and maintaining custom applications for staff across the Office.

Finally, CCB will continue to provide support, training, and assistance to the Office’s staff relating to digital evidence and search warrants, orders and subpoenas for electronic records from email providers, social media companies and cloud hosts.

Assistant D.A. Brianne Kelly is handling the prosecution of the case against OLIVIER under the supervision of Cyber Crime Deputy Bureau Chiefs Virginia Nguyen and Adam Maltz, and Bureau Chief Jeremy Glickman. Cryptocurrency Analyst Lauretta Gorman and Investigative Analyst Antony Misko provided significant assistance in this investigation. Investigative support was also provided by the High Technology Analysis Unit Director Steven Moran and Supervising Computer Forensic Analyst Doug Daus, and Supervising Rackets Investigator Diana Keam and Senior Rackets Investigators Samuel Morales.

###

[1] The charges contained in the indictment are merely allegations and the defendant is presumed innocent unless and until proven guilty. All factual recitations are derived from documents filed in court and statements made on the record in court.