Advanced Course on the Search, Seizure and Confiscation of Online Crime Proceeds
Topic outline
-
-

In this guide, you will find the following:
1. Introduction 1.1 Aim of the Course 1.2 Target Student Group 1.3 Summary of Content 1.3.1 Online Investigative Challenges 1.3.2 Cross-border Investigations 1.3.3 Virtual Currencies 1.3.4 Practical Work/Case Studies 2. Online Investigative Challenges 2.1 Typologies and Money Laundering Online 2.1.1 Use of Internet Banking 2.1.2 Use of other Internet Financial Services 2.1.3 Use of Internet Communication Services 2.1.4 Bulletproof Hosting 2.1.5 Underground Economy 2.2 Identification of the Perpetrator 2.2.1 Network Address Translation (NAT) 2.2.2 Carrier Grade Network Address Translation (CGN) 2.2.3 The use of Anonymisers 2.2.4 Botnets/malware/remote control of a PC 2.2.5 The use of open, public or stolen WiFi 2.2.6 Identification of the Owner of an IP address 2.3 Engagement with ISPs 2.3.1 Type of data being requested 2.3.2 The EU Data retention Directive declared invalid by the decision of the CJEU 2.3.3 National ISPs 2.4 Multinational Service Providers 2.4.1 Jurisdiction 2.4.2 General position 2.4.3 Preservation requests 2.4.4 Emergency requests 2.4.5 Request scope 2.4.6 Notification of subject of request 3. Financial Investigations 3.1 Introduction 3.2 Financial Investigations and Online Crime Proceeds 3.2.1 Elements of Financial Investigation 3.2.2 Cybercrime Aspects of the Financial Investigation 3.2.3 Financial investigation in the European Union 4. Cross-border Cooperation 4.1 Summary 4.1.1 Relevant Networks and Organisations for Exchange of Information and for Mutual Legal Assistance 4.1.2 International Legal Instruments 4.1.3 Provisions on International Cooperation 4.2 Evaluations of the Application of Provisions on International Cooperation 4.2.1 Evaluation related to targeting crime proceeds 4.2.2 Evaluation related to cybercrime 4.3 Use of Templates and Forms for Mutual Legal Assistance 5. Virtual Currencies 5.1 Basic Course Recap 5.2 Introduction to Virtual Currencies 5.2.1 More Virtual Currency Terminology 5.2.2 Virtual Currency Participants 5.2.3 Bitcoin 5.3 Virtual Currency Risks 5.4 Investigative challenges 5.4.1 Knowing that Virtual Currencies have been used 5.4.2 Transaction Anonymity 5.4.3 Identification of Source of Funds 5.4.4 Cash out/realisation and conversion of proceeds 5.5 Freezing/seizing challenges 5.5.1 Virtual Currency as Proceeds of Crime 5.5.2 Identifying the Existence of Virtual Currency 5.5.3 Freezing/Taking Control of Virtual Currency 5.5.4 Asset Management 6. Practical Work/Case Studies 6.1 Literature Search 6.2 Case Study 1: Consideration of Legal Basis for Actions 6.3 Case Study 2: Consideration of FIU/Law Enforcement Interaction 6.4 Case Study 3: Consideration of Cybercrime/Money Laundering Interaction 7. Appendix: List of Relevant Reading 7.1 Council of Europe 7.2 European Union 7.3 United Nations 7.4 Financial Action Task Force 7.5 Jurisprudence 7.6 Other References -