
ICS 206–01: The New Standard Every OSINT Professional Must Know
Explore ICS 206–01: Essential updates for OSINT pros on AI citations, sourcing rules, retention, and a checklist for seamless compliance.What is an Intelligence Community Standard?A new directive, the Intelligence Community Standard (ICS), has just been released, offering a framework designed to ensure consistency, accuracy, and professionalism across the U.S. Intelligence Community (IC). ICS directives provide clear guidelines for processes, methodologies, and workflows, enabling intelligenc...

Python for Dark Web OSINT: Automate Threat Monitoring
Enhance your OSINT toolkit! Learn how to use Python to automate monitoring of dark web forums, leak sites, and marketplaces for actionable threat intelligence. This article is also published on my Medium page. In my previous article, “OSINT: Persistent Threat Monitoring with Google Programmable Search Engines,” I explored the value of open-source intelligence (OSINT) techniques for tracking threats. Since then, I’ve received many questions about how to apply similar methods to the dark web. W...

Point-and-Click OSINT: Dark Web Scraping with GUI Tools
Discover how to gather OSINT data from the dark web without coding. Learn point-and-click scraping tools, techniques, & essential privacy tips. This article is also published on my Medium page. You guys seemed to have enjoyed the last article — Python, dark web OSINT, the whole nine yards! Setting up those scripts, digging into the code… it’s the kind of stuff that makes a cybersecurity geek’s heart sing. But hey, I get it — not everyone wants to get their hands quite so dirty with code. A fe...
Writing about blockchain security and blockchain forensics. Follow me on Twitter for the latest insights.

ICS 206–01: The New Standard Every OSINT Professional Must Know
Explore ICS 206–01: Essential updates for OSINT pros on AI citations, sourcing rules, retention, and a checklist for seamless compliance.What is an Intelligence Community Standard?A new directive, the Intelligence Community Standard (ICS), has just been released, offering a framework designed to ensure consistency, accuracy, and professionalism across the U.S. Intelligence Community (IC). ICS directives provide clear guidelines for processes, methodologies, and workflows, enabling intelligenc...

Python for Dark Web OSINT: Automate Threat Monitoring
Enhance your OSINT toolkit! Learn how to use Python to automate monitoring of dark web forums, leak sites, and marketplaces for actionable threat intelligence. This article is also published on my Medium page. In my previous article, “OSINT: Persistent Threat Monitoring with Google Programmable Search Engines,” I explored the value of open-source intelligence (OSINT) techniques for tracking threats. Since then, I’ve received many questions about how to apply similar methods to the dark web. W...

Point-and-Click OSINT: Dark Web Scraping with GUI Tools
Discover how to gather OSINT data from the dark web without coding. Learn point-and-click scraping tools, techniques, & essential privacy tips. This article is also published on my Medium page. You guys seemed to have enjoyed the last article — Python, dark web OSINT, the whole nine yards! Setting up those scripts, digging into the code… it’s the kind of stuff that makes a cybersecurity geek’s heart sing. But hey, I get it — not everyone wants to get their hands quite so dirty with code. A fe...
Writing about blockchain security and blockchain forensics. Follow me on Twitter for the latest insights.

Subscribe to Ervin Zubic

Subscribe to Ervin Zubic
Share Dialog
Share Dialog


<100 subscribers
<100 subscribers
Learn how law enforcement can tackle crypto asset crimes more effectively. New study uncovers surprising case links and offers tools for success.
You can also find this article on my Medium page.
Law enforcement faces unprecedented hurdles as cybercrimes involving cryptocurrencies surge. The research paper “*Increasing the Efficiency of Cryptoasset Investigations by Connecting the Case*s,” authored by Bernhard Haslhofer and colleagues from various institutions, delves into these issues, focusing on the interconnectedness of crypto asset cases. Published in 2023, this paper explores innovative ways to enhance the investigation process by leveraging the connections between different cases.
The study investigates whether recognizing and acting upon connections between different crypto asset-related cases can streamline investigative processes. The researchers analyzed a dataset containing 34 cyberfraud and 1793 sextortion spam cases, finding significant overlap with 41% of cyberfraud and 96.9% of sextortion cases being interconnected. The methodology hinged on identifying common crypto asset addresses and utilizing common collector wallets, thereby linking cases that might otherwise be treated as isolated incidents.
A major innovation presented is a crypto asset case management tool that enables investigators to identify and share connections effectively. This tool integrates into existing forensic workflows, demonstrating a potential for significant efficiency improvements by promoting collaboration across jurisdictions and crime types.

The study’s strength lies in its empirical approach and the practical application of its findings. Introducing a straightforward method to detect case links addresses a genuine need for more efficient investigative processes. However, the study’s findings are currently limited to data from the Bavarian Central Office for the Prosecution of Cybercrime (January 2021 — July 2023); a broader dataset could enhance their generalizability.
Arguably, the most intriguing aspect of the research is the high percentage of interconnected cases, particularly the 96.9% connectivity in sextortion spam cases. This high linkage rate highlights the routine nature of cybercrime and suggests that much of this activity is more organized and interconnected than previously assumed.


The implications of this research are profound, suggesting that law enforcement agencies across the globe could significantly enhance their efficiency by adopting a collaborative and data-informed approach to investigating crypto asset-related crimes. Future research could expand on these methods to include other types of cybercrime and explore the integration of machine learning techniques to rapidly predict and identify case connections.
https://www.gao.gov/products/gao-23-104768
This study makes a compelling case for integrating advanced data analysis tools in law enforcement, specifically within crypto asset-related crimes. Demonstrating how interconnected many of these cases are paves the way for a new era of cybercrime investigation that is smarter, faster, and more collaborative. The findings encourage further academic research and practical law enforcement applications, promising significant improvements in the management of cybercrime investigations globally.
https://mirror.xyz/ervinzubic.eth/i8U5fAmjJ74idbOX16s6wC7weQwLyjig3CKpYuHNtus
For more blockchain, cybersecurity, and cybercrime research, visit Blockchain Insights Hub.
Follow me on Twitter to get the latest articles and updates directly in your feed. Alternatively, you can subscribe to receive alerts via email whenever I publish new content.
Learn how law enforcement can tackle crypto asset crimes more effectively. New study uncovers surprising case links and offers tools for success.
You can also find this article on my Medium page.
Law enforcement faces unprecedented hurdles as cybercrimes involving cryptocurrencies surge. The research paper “*Increasing the Efficiency of Cryptoasset Investigations by Connecting the Case*s,” authored by Bernhard Haslhofer and colleagues from various institutions, delves into these issues, focusing on the interconnectedness of crypto asset cases. Published in 2023, this paper explores innovative ways to enhance the investigation process by leveraging the connections between different cases.
The study investigates whether recognizing and acting upon connections between different crypto asset-related cases can streamline investigative processes. The researchers analyzed a dataset containing 34 cyberfraud and 1793 sextortion spam cases, finding significant overlap with 41% of cyberfraud and 96.9% of sextortion cases being interconnected. The methodology hinged on identifying common crypto asset addresses and utilizing common collector wallets, thereby linking cases that might otherwise be treated as isolated incidents.
A major innovation presented is a crypto asset case management tool that enables investigators to identify and share connections effectively. This tool integrates into existing forensic workflows, demonstrating a potential for significant efficiency improvements by promoting collaboration across jurisdictions and crime types.

The study’s strength lies in its empirical approach and the practical application of its findings. Introducing a straightforward method to detect case links addresses a genuine need for more efficient investigative processes. However, the study’s findings are currently limited to data from the Bavarian Central Office for the Prosecution of Cybercrime (January 2021 — July 2023); a broader dataset could enhance their generalizability.
Arguably, the most intriguing aspect of the research is the high percentage of interconnected cases, particularly the 96.9% connectivity in sextortion spam cases. This high linkage rate highlights the routine nature of cybercrime and suggests that much of this activity is more organized and interconnected than previously assumed.


The implications of this research are profound, suggesting that law enforcement agencies across the globe could significantly enhance their efficiency by adopting a collaborative and data-informed approach to investigating crypto asset-related crimes. Future research could expand on these methods to include other types of cybercrime and explore the integration of machine learning techniques to rapidly predict and identify case connections.
https://www.gao.gov/products/gao-23-104768
This study makes a compelling case for integrating advanced data analysis tools in law enforcement, specifically within crypto asset-related crimes. Demonstrating how interconnected many of these cases are paves the way for a new era of cybercrime investigation that is smarter, faster, and more collaborative. The findings encourage further academic research and practical law enforcement applications, promising significant improvements in the management of cybercrime investigations globally.
https://mirror.xyz/ervinzubic.eth/i8U5fAmjJ74idbOX16s6wC7weQwLyjig3CKpYuHNtus
For more blockchain, cybersecurity, and cybercrime research, visit Blockchain Insights Hub.
Follow me on Twitter to get the latest articles and updates directly in your feed. Alternatively, you can subscribe to receive alerts via email whenever I publish new content.
No activity yet