Traditionally:
• Contact point for incident response
• Determination of availability of domain names
But also:
• Assisting, public safety organisations, businesses, consumer groups, individuals in combating abuse and fraud and seeking redress.
• Help with online crime attribution
Goldman, Morgenstern und Partner, Gomopa Gmbh, Gomopa Crime, Gomopa Wikipedia, Gomopa Erpressung, Gomopa Wirecard, Gomopa Berlin, Gomopa Ndr, Gomopa Die Zeit, Gomopa S&k, Gomopa Control Inc, Gomopa Autark, Gomopa Ard, Gomopa Account, Gomopa Alexander Stephan, Gomopa Ascent, Anti Gomopa, Gomopa Ogi Ag, Eev Ag Gomopa, Die Akte Gomopa, Gomopacrime, Gomopa Control Inc, Gomopa Cosma, Gomopa Creditsafe, Gomopa Captura, Gomopa Care Energy, Gomopa Curatio, Gomopa Consortis, Gomopa Carsten Simon, Gomopa Die Zeit, Gomopa Diebewertung, Gamepad Dolphin, Gomopa Deutschland, Gomopa Dr. Schulte, Gomopa Erfahrungen, Gomopa Erpressung, Gomopa Eev, Gomopa Eci, Gomopa Elbfonds, Gomopa Erfahrungsbericht, Gomopa Care Energy, Gomopa Facebook, Gomopa Forum, Gomopa Finanznachrichtendienst, Gomopa Fonds Finanz, Gomopa Fuchsgruber, Gomopa Fidentum, Gomopa Faz, Gomopa Foren, Gomopa Gmbh, Gomopa Gmbh Berlin, Gomopa Gmbh Hamburg, Gomopa Hamburg, Gomopa Haz, Gomopa Handelsregister, Gomopa Mega Holdings, Handelsblatt Gomopa, Gomopa Gmbh Hamburg, Gomopa Von Holst, Gomopa Invensys, Gomopa Insolvent, Gomopa Impressum, Gomopa Control Inc, Was Ist Gomopa, Gomopa Junginger, Gomopa Juwi, Gomopa Kreditkarte, Gomopa Klaus Maurischat, Gomopa Kritik, Gomopa Lopoca, Gomopa Login, Thomas Lloyd Gomopa, Gomopa Mastercard, Gomopa Maurischat, Gomopa Mega Holdings, Gomopa Massat, Gomopa Mafia, Gomopa Klaus Maurischat, Mega Holdings Gomopa, Frank Maiwald Gomopa, Erfahrungen Mit Gomopa, Gomopa Net, Gomopa Ndr, Gomopa Net Warnliste, Gomopa News, Gomopa Nachrichten, Gomopa New York, Gomopa Net Pressemitteilung, Gomopa Net Finanzforum, Gomopa Offline, Gomopa Ogi Ag, Gomopa Opfer, Onecoin Gomopa, Gomopa Zeit Online, Michael Oehme Gomopa, Gomopa Pressemitteilungen, Gomopa Pim, Gomopa Pleite, Gomopa Pro Ventus, Gomopa Profi User, Gomopa Probleme, Gomopa Patio, Gomopa Publity, Pulch Gomopa, Gomopa Net Pressemitteilung, Gomopa Queensgold, Gomopa Resch, Gomopa Relom, Gomopa Rwb, Renew Gomopa Profi User, Peter Reski Gomopa, Gomopa Tagesschau, Gomopa Twitter, Gomopa Verklagen, Gomopa Vnr, Gomopa Volz, Gomopa Von Holst, Gregor Schulmeister, ehrenfried stelzer, Klaus Maurischat, Klaus-Dieter Maurischat,Peter Ehlers, Gerd Bennewirtz, Wolfgang Zimmermann, Johann Sternberg, Sven Schmidt, Frank Maiwald, Aline Kleinwaechter, Mark Vornkahl, Gomopa Verbrecher, Gomopa Pro Ventus, Mark Vornkahl Gomopa, Gomopa Warnliste, Gomopa Wikipedia, Gomopa Wirecard, Gomopa Wellstar, Gomopa Wiki, Gomopa Net Warnliste, Robert Wallis Gomopa, Www.gomopa.net Forum, Wallis Gomopa, Andreas Wohlers Gomopa, Gomopa New York, Gomopa Zapp, Gomopa Zeit, Gomopa Zeit Online, Gomopa Die Zeit, Klaus Maurischat, Klaus Maurischat Gomopa, Klaus Dieter Maurischat, Klaus Maurischat Stasi, Klaus Maurischat Facebook, Klaus Maurischat Berlin, Klaus Maurischat Verden, Klaus Maurischat Mark Vornkahl, Klaus Maurischat Berlin, Klaus Dieter Maurischat, Klaus Maurischat Facebook, Klaus Maurischat Gomopa, Klaus Maurischat Mark Vornkahl, Klaus Maurischat Stasi, Klaus Maurischat Verden, Klaus Maurischat Mark Vornkahl, Betrug In English, Betrug Englisch, Betrug Stgb, Betrug Schema, Betrug Meaning, Betrug Ebay Kleinanzeigen, Betrug Definition, Betrug Duden, Betrug Synonym, Betrug Melden, Betrug Auf Englisch, Betrug Airbnb, Betrug Anzeigen, Betrug Antragsdelikt, Betrug Amazon, Betrug Autokauf, Betrug Aufbau, Betrug Auf Ebay Kleinanzeigen, Betrug Autoverkauf, Betrug Anzeige, Betrug Bgb, Betrug Bei Ebay, Betrug Bei Ebay Kleinanzeigen, Betrug Beim Autokauf, Betrug Beim Autoverkauf, Betrug Bei Amazon, Betrug Bei Paypal, Betrug Bei Ebay Kleinanzeigen Was Tun, Betrug Bei Kleiderkreisel, Betrug Bei Ebay Melden, Betrug Curling, Betrug Definition, Betrug Duden, Betrug Dict, Betrug Durch Unterlassen, Betrug Durch Unterlassen Schema, Betrug Dsds 2015, Betrug Diebstahl, Betrug Durch Unterlassen Fall, Betrug Deutschland, Betrug Dsds, Betrug English, Betrug Englisch, Betrug Ebay Kleinanzeigen, Betrug Ebay, Betrug Gesetz, Betrug Geringwertig, Betrug Gewinnspiel, Betrug Haftstrafe, Betrug Hausarbeit, Betrug Hartz 4, Betrug Handyvertrag, Betrug Hauskauf, Betrug Heinrich, Betrug Handynummer, Betrug Handwerker, Betrug In English, Betrug Im Internet, Betrug Im Weissen Kittel, Betrug In Englisch, Betrug Immobilienscout, Betrug In Der Ehe, Betrug Im Internet Was Tun, Betrug Immobilienscout24, Betrug Jura, Betrug Jobcenter, Betrug Juristisch, Betrug Jusline, Betrug Juristische Person, Betrug Ja Sagen, Betrug Juraschema, Betrug Juracademy, Betrug Jura Online, Betrug Juris, Betrug Kleinanzeigen, Betrug Kreditkarte, Betrug Kleiderkreisel, Betrug Krankenkasse, Betrug Latein, Betrug Liebe, Betrug Leoni, Betrug Lebensversicherung, Betrug Lotto, Betrug Lastschrift, Betrug Meaning, Betrug Melden, Betrug Mit Paypal, Betrug Mehrzahl, Betrug Microsoft Anruf, Betrug Mit Western Union, Betrug Mobile.de, Betrug Mit Handynummer, Betrug Mit Whatsapp, Betrug Mit Paysafecard, Betrug Nachweisen, Betrug Nummer, Betrug Nebenkostenabrechnung Strafanzeige, Betrug Nigeria, Betrug Nach Stgb, Betrug Nebenkostenabrechnung, Betrug Nachsendeauftrag, Betrug Ne Demek, Betrug Nebenklage, Betrugsnummer Melden, Betrug Online Melden, Betrug Online, Betrug Onecoin, Betrug Obersatz, Betrug Ohne Schaden, Betrug Ohne Vorsatz, Betrug Online Banking, Betrug Objektiver Tatbestand, Betrug Oder Unterschlagung, Betrug Online Casino, Betrug Plural, Betrug Paypal Kleinanzeigen, Betrug Paypal, Betrug Quoka, Betrug Qualifikation, Betrug Quoka Polizei, Betrug Quizduell, Betrug Qualifikationen, Betrug Quotes, Betrug Quizsendung Schweiz, Betrug Questico, Betrug Quotenschaden, Betrug Quizsendung, Betrug Rentenversicherung, Betrug Russisch, Betrug Ris, Betrug Russische Frauen, Betrug Rechtsanwalt, Betrug Reisekostenabrechnung, Betrug Stgb, Betrug Schema, Betrug Synonym, Betrug Strafe, Betrug Schweiz, Betrug Strafantrag, Betrug Stoffgleichheit, Betrug Tatbestand, Betrug Translation, Betrug Traumdeutung, Betrug Tatbestandsmerkmale, Betrug Thermomix, Betrug Telekom Rechnung, Betrug Telekom, Betrug Tatbestandsvoraussetzungen, Betrug Trotz Paypal, Betrug Teppichreinigung, Betrug Unterschlagung, Betrug Vorsatz, Betrug Verzeihen, Betrug Wucher, Betrug Wiki, Betrug Willhaben, Betrug Was Tun, Betrug Whatsapp, Betrug Western Union, Betrug Wieder Gut Machen, Betrug Web.de, Betrug Wohnwagen Verkauf, Betrug Warenbestellung, Xtrasize Betrug, Xing Betrug, Sgb Xii Betrug, Fg Xpress Betrug, Garten Xxl Betrug, Xango Betrug, Xmile Betrug, Xcite Betrug, Xtb Betrug, Xbox Betrug, Betrug Yourfone, Betrug Youtube, Betrug Yahoo, Yotta Betrug, Yelp Betrug, Yoox Betrug, Youtradefx Betrug, Youtailor Betrug, Yokebe Betrug, Yoga Betrug, Betrug Zitate, Betrug Zermatt, Betrug Zweckverfehlung, Betrug Zum Nachteil Von Versicherungen, Betrug Zjs, Betrug Zum Nachteil, Betrug Zugunsten Dritter, Betrug Zahnarzt, Betrug Zweifel Irrtum, Betrug Zahnarzt Dessau, Cybercrime Definition, Cybercrime Statistics, Cybercrime Prevention, Cybercrime Articles, Cybercrime Jobs, Cybercrime Law, Cybercrime Statistics 2017, Cyber Crime Cases, Cyber Crime News, Cybercrime Topics, Cybercrime Articles, Cybercrime And Security, Cybercrime As A Service, Cybercrime And Digital Forensics An Introduction, Cybercrime And Digital Forensics, Cybercrime And Society, Cybercrime And Terrorism, Cybercrime Attacks, Cybercrime Act, Cybercrime Against Businesses, Cyber Crime Batman, Cyber Crime Book, Cybercrime Blog, Cybercrime Bill, Cybercrime Banks, Cybercrime Background, Cyber Crime By Country, Cybercrime Bangalore, Cybercrime Billion Dollar Industry, Cybercrime Background Information, Cyber Crime Cases, Cybercrime Certification, Cybercrime Convention, Cybercrime Careers, Cybercrime Cost, Cybercrime Cafe, Cybercrime Cost 2016, Cybercrime China, Cybercrime Conference, Cybercrime Conclusion, Cybercrime Definition, Cybercrime Definition Computer, Cybercrime Definition Fbi, Cyber Crime Data, Cybercrime Degrees, Cybercrime Definition Pdf, Cybercrime Database, Cyber Crime Detective, Cyber Crime Documentary, Cyber Crime Department, Cybercrime Example, Cyber Crime Essay, Cybercrime Effects, Cybercrime Events, Cybercrime Enforcement, Cybercrime Economy, Cyber Crime Ethics, Cybercrime Effects On Business, Cybercrime Ecosystem, Cybercrime Enforcement Training Assistance Act, Cybercrime Facts, Cybercrime Fbi, Cybercrime Forensics, Cybercrime Forum, Cybercrime Forensics Training Center, Cybercrime Federal Laws, Cyber Crime Fiction, Cybercrime Financial Services, Cybercrime Future Trends, Cybercrime Fiji, Cybercrime Gets Personal Money Magazine, Cybercrime Gets Personal, Cybercrime Growth, Cyber Crime Graph, Cybercrime Groups, Cybercrime Government, Cybercrime Global Statistics, Cyber Crime Gov, Cyber Crime Games, Cybercrime Gif, Cybercrime Hacking, Cyber Crime History, Cybercrime Help, Cybercrime Healthcare, Cybercrime Hyderabad, Cybercrime How To Report, Cyber Crime Hotline, Cybercrime Hacking News, Cyber Crime Head Office India, Cybercrime Hacking And Cracking, Cybercrime Identity Theft, Cybercrime In The Us, Cyber Crime Investigation, Cybercrime Images, Cyber Crime Insurance, Cybercrime Is Also Known As, Cybercrime Investigating High-technology Computer Crime, Cybercrime Infographic, Cybercrime Information, Cyber Crime In Russia, Cybercrime Jobs, Cybercrime Jurisdiction, Cybercrime Journal Articles, Cybercrime Job Description, Cybercrime Jobs Salary, Cybercrime Job Openings, Cybercrime Jobs In Chennai, Cybercrime Job Qualification, Cybercrime Journal Articles Pdf, Cyber Crime Jamaica, Cybercrime Kenya, Cybercrime Key Issues And Debates, Cybercrime Kuwait, Cybercrime Ki Dhara, Cybercrime Key Issues And Debates Pdf, Cybercrime Kasus, Cyber Crime Karnataka, Cybercrime Kartu Kredit, Cybercrime Kolkata, Cyber Crime Karachi, Cybercrime Law, Cybercrime Laws In Usa, Cybercrime Law Enforcement, Cybercrime Laws Of The United States, Cybercrime List, Cybercrime Legislation Us, Cybercrime Laws In Florida, Cybercrime Legal Issues, Cybercrime Law Outline, Cyber Crime Lesson Plans, Cybercrime Meaning, Cyber Crime Movies, Cybercrime Methods, Cybercrime Methodology, Cyber Crime Money, Cybercrime Markets, Cyber Crime Magazine, Cyber Crime Most Wanted, Cybercrime Meaning In Tamil, Cybercrime Masters Degree, Cyber Crime News, Cyber Crime News Articles, Cyber Crime News Articles 2017, Cyber Crime Netflix, Cybercrime Nigeria, Cyber Crime Novels, Cybercrime Number, Cybercrime Nhs, Cyber Crime News Philippines, Cybercrime Nbi, Cybercrime Or Cyber Crime, Cybercrime Organizations, Cybercrime On The Rise, Cybercrime On The High Seas, Cybercrime Offenses, Cyber Crime Outline, Cybercrime Office, Cybercrime Office In Ahmedabad, Cybercrime Office In Patna, Cybercrime Office In Nashik, Cybercrime Quotes, Cyber Crime Quizlet, Cybercrime Questions, Cyber Crime Quiz, Cybercrime Questionnaire, Cybercrime Question Paper, Cybercrime Qatar, Cybercrime Question And Answers, Cybercrime Report, Cybercrime Research Paper, Cyber Crime Rates, Cyber Crime Recent, Cybercrime Research Topics, Cybercrime Research, Cybercrime Reported To The Ic3, Cybercrime Resources, Cybercrime Riding Tax Season Tides, Cyber Crime Report 2016, Cybercrime Statistics, Cybercrime Statistics 2017, Cyber Crime Stories, Cybercrime Spyware, Cybercrime Statistics 2015, Cybercrime Security, Cybercrime Solutions, Cybercrime Salary, Cybercrime Small Business, Cyber Crime Synonym, Cybercrime Topics, Cybercrime Trends, Cybercrime Tracker, Cybercrime Treaty, Cyber Crime Types, Cybercrime Training, Cybercrime Threats, Cybercrime Tools, Cybercrime Terms, Cybercrime The Transformation Of Crime In The Information Age, Cyber Crime Unit, Cybercrime Us, Cybercrime Uk, Cybercrime Uae, Cybercrime University, Cybercrime Un, Cyber Crime Unit Mauritius, Cyber Crime Unit Malta, Cybercrime Uc, Cybercrime Unodc, Cybercrime Victims, Cybercrime Vs Traditional Crime, Cybercrime Videos, Cybercrime Vs Traditional Crime Statistics, Cybercrime Virus, Cyber Crime Vocabulary, Cybercrime Vs Traditional Crime Punishment, Cybercrime Vs Computer Crime, Cybercrime Vs Cyber Warfare, Cybercrime Vs Cyber Espionage, Cybercrime Wiki, Cybercrime Worm, Cybercrime World Wide War 3.0, Cyber Crime Websites, Cyber Crime Worksheet, Cybercrime Wallpaper, Cyber Crime Worldwide, Cybercrime Working Group, Cyber Crime What Is It, Cybercrime Wikipedia Indonesia, Cybercrime X-remote Download, Tedx Cybercrime, Cyber Crime Youtube, Cyber Crime Yahoo, Cyber Crime Yahoo Answers, Cyber Crime Yesterday, Cyber Crime Youth, Cybercrime Yang Menyerang Hak Cipta, Cybercrime Yar, Youth Cyber Crime, Cyber Crime Yogyakarta, Cybercrime Yang Menyerang Pemerintah, Cybercrime Zimbabwe, Cybercrime Zeus, Cybercrime Zimbra, Zurich Cyber Crime, Zimbabwe Cybercrime Bill, Cyber Crime In Zambia, New Zealand Cyber Crime, Los Zetas Cybercrime, Cybercrime Law In Zambia, Cyber Crime Cases In Zambia, Erpressung Englisch, Erpressung English, Erpressung Stgb, Erpressung Auf Englisch, Erpressung Schema, Erpressung Definition, Erpressung Synonym, Erpressung Schumacher, Erpressung Von Haus Stelleris, Erpressung Auf Englisch, Erpressung Am Arbeitsplatz, Erpressung Aufbau, Erpressung Anzeigen, Erpressung Anzeige, Erpressung Anzeige Erstatten, Erpressung Bedeutung, Erpressung Borussia Dortmund, Erpressung Bgb, Erpressung Bvb, Erpressung Bei Kindern, Erpressung Bilder, Erpressung Bibel, Erpressung Beziehung, Erpressung Bei Facebook, Erpressung Beispiel, Erpressung Corinna Schumacher, Erpressung Corinna, Erpressung Club Globe, Erpressung Ch, Erpressung Carstensen, Erpressung Chef, Erpressung Chantage, Erpressung Chat, Erpressung Computer, Erpressung Cz, Erpressung Definition, Erpressung Duden, Erpressung Dict, Erpressung Durch Arbeitgeber, Erpressung Durch Skype Video, Erpressung Drohung Mit Strafanzeige, Erpressung Drohung Mit Anzeige, Erpressung Durch Unterlassen, Erpressung Deutschland, Erpressung Durch Rechtsanwalt, Erpressung Englisch, Erpressung English, Erpressung Gesetz, Erpressung Geld Oder Anzeige, Erpressung Geld, Erpressung Geschichte, Erpressung Gewalt, Erpressung Gut Aiderbichl, Erpressung Grundschule, Erpressung Geldstrafe, Erpressung Griechenland, Erpressung Hitchcock, Erpressung Heinrich, Erpressung Haftstrafe, Erpressung Hacker, Erpressung Haus Stelleris, Erpressung Hausarbeit, Erpressung Hells Angels, Erpressung Hsv, Erpressung In English, Erpressung In Englisch, Erpressung Im Internet, Erpressung In Der Beziehung, Erpressung In Der Schule, Erpressung Internet, Erpressung Im Internet Was Tun, Erpressung Italienisch, Erpressung In Der Ehe, Erpressung In Beziehung, Erpressung Jura, Erpressung Jura Individuell, Erpressung Jugendstrafe, Erpressung Jusline, Erpressung Juraschema, Erpressung Juristisch, Erpressung Juristische Definition, Erpressung Juristische Person, Erpressung Jugendamt, Erpressung Jva, Erpressung Kinder, Erpressung Lidl, Erpressung Leo, Erpressung Latein, Erpressung Lebensmittel, Erpressung Lebensmittelhersteller, Erpressung Mit Bildern, Erpressung Mit Fotos, Erpressung Mit Video, Erpressung Mit Anzeige, Erpressung Michael Schumacher, Erpressung Mindeststrafe, Erpressung Mit Schlechter Bewertung, Erpressung Mit Strafanzeige, Erpressung Mit Youtube Video, Erpressung Mit Todesfolge, Erpressung Offizialdelikt, Erpressung Online, Erpressung Polnisch, Erpressung Polizei, Erpressung Quandt-erbin, Erpressung Quant, Erpressung Qualifikation, Quand Erpressung, Erpressung Stgb, Erpressung Schema, Erpressung Synonym, Erpressung Schumacher, Erpressung Schweiz, Erpressung Strafrecht, Erpressung Stgb Schema, Erpressung Unter Kindern, Erpressung Von Haus Stelleris, Erpressung Von Apple, Erpressung Von Haus Stelleris Weltquest, Erpressung Von Haus Stellaris Wow, Erpressung Virus, Erpressung Vergehen Oder Verbrechen, Erpressung Verbrechen, Erpressung Wiki, Erpressung Whatsapp, Erpressung Wie Verhalten, Erpressung Was Ist Deine Familie Wert, Erpressung Youtube, Yelp Erpressung, Erpressung Mit Youtube Video, Erpressung Zitate, Erpressung Zur Falschaussage, Erpressung Zell Am See, Erpressung Zivilrechtlicher Anspruch, Erpressung Zjs, Erpressung Zu Sexuellen Handlungen, Erpressung Zivilrecht, Zeitarbeit Erpressung, Zeitungsartikel Erpressung, Rufmord English, Rufmord Auf Englisch, Rufmord Schweiz, Rufmord Gesetz, Rufmord Strafe, Rufmord Stgb, Rufmord Anzeige, Rufmord Bedeutung, Rufmord Auf Englisch, Rufmord Anzeige, Rufmord Am Arbeitsplatz, Rufmord Bedeutung, Rufmord Bgb, Rufmord Band, Rufmord Bei Facebook, Rufmord Beispiele, Rufmord Begehen, Rufmord Bestrafung, Rufmord Bei Wahrheit, Rufmord Beweisen, Rufmord Bei Der Arbeit, Rufmord Chef, Rufmord Im Internet Christian Scherg, Major Crimes Rufmord, Cybermobbing Rufmord, Rufmord Durch Chef, Notruf California Rufmord, Rufmord Definition, Rufmord Duden, Rufmord Dict, Rufmord Durch Presse, Rufmord Durch Kollegen, Rufmord Durch Arbeitgeber, Rufmord Durch Vermieter, Rufmord Die Drei Fragezeichen, Rufmord Durch Polizei, Rufmord Dejure, Rufmord English, Rufmord Englisch, Rufmord Film, Rufmord Facebook Strafe, Rufmord Firma, Rufmord Gesetz, Rufmord Gerichtsurteile Paragrafen, Rufmord Gesetz Deutschland, Rufmord Geldstrafe, Rufmord Gesetzestext, Rufmord Hassel, Rufmord Hilfe, Rufmord Helmut G, Rufmord Haftstrafe, Rufmord Hip Hop, Rufmord In English, Rufmord Im Internet, Rufmord In Der Familie, Rufmord Im Internet Strafe, Rufmord Internet, Rufmord Im Internet Was Tun, Rufmord Im Internet 37 Grad, Rufmord In Der Schule, Rufmord In Facebook, Rufmord Im Netz, Rufmord Juristisch, Rufmord Jenseits Der Moral, Rufmord Jenseits Der Moral Stream, Rufmord Jenseits Der Moral Trailer, Rufmord Jusline, Rufmord Jura, Rufmord Klage, Rufmord Kroatisch, Rufmord Konsequenzen, Rufmord Klage Gericht, Rufmord Lehrer, Rufmord Luxemburg, Rufmord Mobbing, Rufmord Mitarbeiter, Rufmord Medicopter 117, Rufmord Menschen Hautnah, Rufmord Medien, Rufmord Musik, Rufmord Mit Todesfolge, Rufmord Machen, Rufmord Melden, Rufmord Metin2, Rufmord Nachbarn, Rufmord Oder Verleumdung, Rufmord Ohne Namen, Rufmord Ohne Beweise, Rufmord Opfer, Rufmord Online, Rufmord Band Oberberg, Rufmord Polizei, Rufmord Paragraph, Rufmord Privat, Rufmord Rapper, Rufmord Schweiz, Rufmord Strafe, Rufmord Stgb, Rufmord Strafbar, Rufmord Schadensersatz, Rufmord Tatbestand, Rufmord Und Verleumdung, Rufmord Unternehmen, Rufmord Verleumdung, Rufmord Was Tun, Rufmord Wiki, Rufmord Welche Strafe, Rufmord Wie Vorgehen, Rufmord Wenn Stimmt, Rufmord Was Dagegen Tun, Rufmord Wdr, Rufmord Was Kann Man Tun, Rufmord Welcher Anwalt, Rufmord Wahrheit, Youtube Rufmord Im Internet, Rufmord Youtube, Rufmord Zitate, Rufmord Zeitung, Rufmord Zgb, Rufmord Zivilrecht, Rufmord Zur Anzeige Bringen, Rufmord Bild Zeitung, Rufmord Durch Zeitung, Rufmord Im Internet Zdf
About how signals intelligence agencies, like NSA and GCHQ, are intercepting communications, we learned a lot from the Snowden revelations and the German parliamentary inquiry, but also from new legislation in France, the Netherlands and the United Kingdom.
Much less is known about the practice of tapping by law enforcement, like for example the FBI and police forces. Now, a case from the Netherlands provides some interesting insights in how Dutch police intercepts internet communications – in a way that comes remarkably close to the bulk collection by intelligence agencies.
Office of the Team High Tech Crime (THTC) of the Dutch police in Driebergen (photo: NRC/Merlin Daleman)
Cooperation with the Russians
On Saturday, May 27, the Dutch newspaper De Volkskrant came with a surprising storyabout the cooperation between the Team High Tech Crime (THTC) of the Dutch police and officials from the Russian federal security service FSB, which is the main successor to the notorious KGB.
Since 2009, regular meetings are held in the Netherlands, in which also officials from the FBI participate. The aim is to cooperate in tracking down and eventually arresting cyber criminals. The Volkskrant’s front page report is accompanied by an extensive background story, which contains some more worrying details, but is only available in Dutch.
The cooperation with the Russians dates back to September 2007, when the head of THTC attended a conference in the Russian city of Khabarovsk, at which CIA, FBI, Mossad, BND and other agencies were present. The head of THTC was able to create a connection to the FSB and their deputy head of the department for cyber crime, Sergei Mikhailov, became the liaison for the Dutch police and would regularly visit the Netherlands.
Meetings in Driebergen
Initially, the meetings with the Russians were held in the Dutch village of Driebergen, where the Team High Tech Crime has its offices. The Dutch security service AIVD was apparently not very fond of this, so every visit of for example Mikhailov had to be reported, and since 2012, every police officer who had contact with someone from the FSB was briefed by the AIVD before and after every meeting.
The FSB, much like the FBI, isn’t just responsible for law enforcement, but is also Russia’s secret service for domestic security. This made AIVD worried that FSB officers could use their visits to the Netherlands for spying – although strictly spoken, collecting foreign intelligence is the task of another Russian agency, the SVR.
The police compound in Driebergen started as highway patrol station, but nowadays houses some of the most sensitive units of the Dutch police, including the national criminal investigation branch and the Unit Landelijke Interceptie (or Lawful Interception, ULI), which was created in 2005 as the central facility for internet tapping, as well as for telephone tapping on behalf of all the smaller police districts.*
The police compound in the village of Driebergen (photo via Flickr)
Security incident
There was at least one security incident in Driebergen: De Volkskrant describes that during a meeting with FBI and FSB, a Russian official came to a member of the Dutch police team, pointed at someone from the FBI and said “he is copying your data”. An investigator went looking and saw that indeed the American had a thumb drive in a police laptop and was copying Dutch information. Whether this had any consequences was not reported.
In 2014, the cooperation with Russia came under pressure: in July, there was the Russian annexation of the Crimea and shortly aftwerwards, flight MH17 was shot down, killing 193 Dutch citizens. The criminal investigation of this case also takes place in Driebergen, so the police decided to move to meetings with FSB officials from Driebergen to police stations in Amsterdam and Rotterdam.
Intercepting at Leaseweb
The first case in which Dutch police and Russian FSB cooperated started in 2008, when Russian criminals used the ZeuS trojan horse malware to spoof the login screen of banks in order to capture user credentials, and steal the money from bank accounts without a trace.
Often these criminals used servers of the Dutch hosting company Leaseweb, which offers relatively anonymous and cheap services as well as high-speed connections, as it is close to the large Amsterdam internet exchange AMS-IX. To communicate with eachother, the criminals used the messenger service ICQ, which is still popular in Russia and Eastern Europe, but doesn’t use encryption.
To catch the criminals behind the ZeuS malware, the Dutch police team set up operation Roerdomp (the Dutch name for the Eurasian bittern) and in October 2008, they asked other countries for the ICQ numbers of known cyber criminals. Within 3 months, authorities from the US, Germany, Britain, the Ukraine and Russia provided a total of 436 ICQ numbers. In January 2009, the public prosecutor and an examining judge approved the interception of communications associated with these numbers.
ICQ logo and interface
DPI filtering
To acquire these ICQ communications, the police had decided to intercept all ICQ traffic from Russia that went through the Leaseweb servers. For that purpose they bought equipment for deep-packet inspection (DPI) worth 600.000,- euro.
DPI devices are able to examine the packets that make up internet traffic and filter them according to predefined criteria, usually to prevent viruses and spam, but in this case for intercepting communications.
High-end DPI equipment, from manufacturers like Narus and Verint, can also recreate(“sessionize”) the communication sessions in order to filter complete files and messages out – which is also one of the main features of NSA’s XKEYSCORE system.
The Volkskrant reports that after the interception was approved, the new equipment was connected to the servers of Leaseweb, but actually, Leaseweb will have splitted the traffic on its main backbone cable, creating a copy of all the data, which was then directed to the police computer – telecom and internet companies really don’t like outsiders to install equipment onto their actual networks.
Next, all the copied Leaseweb traffic, some 50 Gigabit per second for 4 to 10 million websites, went through the DPI machine. First the police filtered out all ICQ traffic, and then the ICQ traffic associated with the list of the 436 selected numbers. This went on for 3 months, so the warrant was apparently renewed a few times, as an approval for targeted interception is initially limited to a period of 4 weeks.
Leaseweb headquarters in Amsterdam (click to enlarge)
Some questions
The description of the tapping operation by De Volkskrant raises some questions. Government filtering systems having access to all the internet traffic of a company is the way that (signals) intelligence agencies are conducting bulk collection, not the way that law enforcement is supposed to do targeted interception.
In western countries, the police is generally only allowed to tap communications associated with individually identified suspects or specific communication identifiers, like phone numbers and e-mail addresses. In the ZeuS case, it was probably argued that it was targeted interception because there were 436 specific identifiers: the ICQ numbers of known cyber criminals.
Foreign selectors
First, this case immediately reminds of the selector affair that came to light through the German parliamentary inquiry into the cooperation between NSA and BND. For years, NSA provided the Germans with millions of internet identifiers, which they entered into their satellite collection system, without being able to see to whom these identifiers belonged.
Could that have happened to the Dutch police too? Were they able to verify that each one of the 436 ICQ numbers was used by a cyber criminal, or did they just trusted the foreign authority that provided them?
For this kind of international cooperation, it’s often inevitable that you have to trust your foreign partners, but then you should also try to make sure that the data collection is as careful and targeted as possible.
Dutch internet tapping
One way to assure that is through technical means. For telephone tapping this is relatively easy, because telephone switches have built-in tapping capabilities based upon international standards. For internet tapping this is different and external devices have to be used to pick out the communications of interest.
In the Netherlands, the interception of internet data uses the Transport of Intercepted IP Traffic (TIIT) protocol, which ensures that the police only gets the internet data associated with an IP or e-mail address for which there’s a warrant.
Overview of the TIIT protocol for IP and e-mail interception (click to enlarge)
First, an Internet Service Provider (ISP) copies all its traffic and leads the copy to a secured interception network on its own premises. There, a sniffer machine (S1) filters out the data that have to be intercepted, and encrypts these with a key that is associated with a particular warrant.
Then, these data go to the ISP collector machine (S2), which sets up a connection, through an encrypted tunnel over a regular internet link, to a government collector machine (T1), which receives the data from one or more S2 machines.
The T1 devices are managed by the Unit Lawful Interceptions (ULI) in Driebergen and from there, the intercepted data are distributed to computers (T2) at the tapping rooms (tapkamers) of the police districts. Here, they are stored and decrypted so the intercepted communications become available in plain text.
Intercepting hosting providers
With the TIIT protocol, the police doesn’t get access to the copy of an ISP’s entire traffic: it’s the ISP that controls the sniffer machine that filters out the communications that belong to a particular suspect. But at Leaseweb it was apparently the police that controlled the sniffer (in the form of DPI equipment) where all the traffic passed through.
The most likely reason for this is that Leaseweb is a hosting provider and it’s considered that such companies don’t have to comply with the Dutch Telecommunications Law that says that public communication networks or services have to be interceptable. Therefore, hosting providers were not required to install the tapping facilities like the telephone and internet access companies have.
But the hosting companies can of course cooperate voluntarily when the police presents them a warrant. However, when the new Secret Services Act comes into force, such non-public communication providers do have to tolerate interception on behalf of AIVD and MIVD, but they don’t need to have pre-installed tapping capabilties.
This means that in both cases, even for targeted interception, the government will control the sniffer equipment for filtering up to a company’s entire traffic – something that digital rights groups like the ACLU already consider to be unlawful “bulk surveillance.”
Oversight
Another question is how to make sure that the police doesn’t misuse it’s power when for example a hosting provider voluntarily provides access to their entire traffic. Maybe the police has internal protocols for that, but while interception conducted by the secret services is subject to independent oversight, police tapping is not.
It’s considered that in criminal cases, a judge will eventually decide whether certain police methods are lawful or not, but in practice, judges often lack the necessary technical knowledge, while police and public prosecutors try to hide these sensitive techniques. It’s not clear whether any suspect in the ZeuS case was tried before a Dutch court.
Untargeted interception
The ZeuS case shows that not only the networks of telecommunications and internet service providers can be useful to intercept, but also hosting providers like Leaseweb, especially when their servers are used by foreign companies to host their internet (communication) services – useful, not only for the police, but also for the secret services AIVD and MIVD.
Soon, both services can even go a step further, as the new Secret Services Act will also allow them to conduct untargeted cable interception. That means that they may not only filter out communications that are associated with already known identifiers, but also (temporarily) store all the metadata and a lot of content in order to search for data that belong to yet unknown targets.
In the public debate about the new law, there was a lot of speculation about how the new untargeted cable access will be implemented, but the interception at Leaseweb, as described by De Volkskrant, gives a very concrete example of what can be expected.
National watch center of the Royal Marechaussee in Driebergen
with a large dark gray Philips PNVX crypto telephone (photo: AmberAlert.nl)
The end of ZeuS
After collecting the messages associated with the 436 ICQ numbers and subsequently analysing them, it came out that one particular ICQ number acted as the leader of the cyber crime network. In one of the intercepted conversations this person even admitted to be the designer of the ZeuS malware.
The police gave him the codename “Umbro”, but he himself used aliasses like Lucky12345, Monstr, Slavik, IOO, Pollingsoon, and Nu11. De Volkskrant story doesn’t tell how the police found out the real identity of “Umbro” and it was only in 2014, under the international law enforcement Operation Tovar, that he was identified as Evgeniy Mikhailovich Bogachev, born October 28, 1983.
Already in 2013, investigators noticed that the ZeuS virus wasn’t just used for stealing money anymore, but also for finding out very specific information about government officials of Russia’s neighbours. Dutch police and the FBI became convinced that “Umbro” (Bogachev) had started working for Russian intelligence too.
To be or not to be arrested
The latter seems to be one of the reasons that, after the hack of the Democratic National Committee (DNC) in 2016, the US government put Bogachev on a list of sanctioned individuals. Besides that, his malware was also responsible for stealing over 100 million USD from American organizations. However, Bogachev is still at large, probably because he is useful for Russian intelligence operations.
For the Dutch police team there was another unpleasant surprise: Sergei Mikhailov, the FSB officer who had become such a familiar face for them, was suddenly arrested in December 2016 – according to Russian press reports because he and Kaspersky expert Ruslan Stojanov had leaked information to US intelligence.
Nobody knows whether this is true or where Mikhailov is now, but the cooperation between Dutch police and the Russian FSB continues.
When it comes to mobile broadband internet, there are a variety of numerous systems, for example LTE, 3rd generation as well as 4G, which allow continuous transmission of the web sign towards the cell phone. A special broadband Wi-Fi signal doesn’t depend on line-of-sight transmitters check over here.
Of course it is e2e crypted. That is why SS (Secret Service) need help from ISPs. All the “targeted” traffic goes through LI (Lawful Intercept) devices. SS is interested not only what you speak about, but with who you are speaking as well. With little bit of fishing or other methods you get the key to decrypt all the traffic and encrypt it again – so no one knows ’bout it.
Sie kennen das: Ein Clown sendet Ihnen eine E- Mail.
Der Clown nennt sich oder ist Rainer von Holst. Alles ohne Beweis. Was macht man damit ? Richtig. Man fragt Google und die User.
Die Rainer von Holst-Clown Maske mit falscher E-Mail inklusive cc an “Polizei” ohne handfeste Beweise – Ist das ein gelungener Halloween-Scherz ? Oder sind andere Horror-Clowns noch besser ?
a Adolf Hitler
b Benito Mussolini
c Rainer von Holst
d Nero
Wer hat die beste Horror-Clown-Frisur ?
a Fury
b Rainer von Holst
c Flipper
d Lassie
You will be the Judge !
Horror Clown Movies, Horror Clown Movies 2016, Horror Clown Makeup, Horror Clown Movie 2017, Horror Clown Videos, Horror Clown Costumes, Horror Clown Mask, Horror Clown Pics, Horror Clown Stories, Horror Clown Names, Scary Clown American Horror Story, Evil Clown American Horror Story Actor, American Horror Story Clown, Horror Movie About Clown, Horror Movie With Clown And Babysitter, Clown American Horror Story Actor, American Horror Clown Costume, American Horror Clown Mask, American Horror Clown Actor, Clown American Horror Story Trailer, Horror Clown Books, Horror Clown Birthday, Horror Clown Bilder, Horror Clown Breda, Horror Clown Blick, Horror Clown Basel, Horror Film Clown Babysitter, Horror Movie Clown Babysitter, Horror Story Clown Babysitter, American Horror Story Clown Backstory, Horror Clown Costumes, Horror Clown Costumes Adults, Horror Clown Character, Horror Clown Costume Ideas, Horror Clown Costumes Uk, Clown Horror Comedy, American Horror Clown Costume, Classic Horror Clown Costume, Womens Horror Clown Costume, Horror Movie Clown Costume, Horror Clown Drawings, Horror Clown Dolls, Horror Clown Dailymotion, Horror Clown Director, Horror Clown Deutsch, Horror Clown Deutschschweiz, Horror Dog Clown Car, Horror Dome Clown, Horror Clown Fancy Dress, Horror Clown Videos Dailymotion, Horror Clown England, Horror Clown Es, Horror Clown Eli Roth, Horror Clown Essen, Evil Clown Horror Movie, Evil Clown Horror, American Horror Story Clown Episode, Evil Clown American Horror Story, Evil Clown American Horror Story Actor, American Horror Story Clown Episode 1, Horror Clown Film, Horror Clown Face, Horror Clown Face Paint, Horror Clown Film 2015, Horror Clown Full Movie, Horror Clown Fancy Dress, Horror Clown Figurine, Horror Clown Frankrijk, Horror Clown Frankreich, Horror Clown France, Horror Clown Gifs, Horror Clown Games, Horror Clown Geschichte, Horror Clown Geschichten, Horror Clown Gesicht, Horror Clown Girl, American Horror Clown Gif, Scary Clown Horror Gif, Clown Horror Movie Gif, American Horror Story Clown Girl, Horror Clown Halloween, Horror Clown Huren, Horror Clown Images, Horror Clown In Nederland, Horror Clown In Der Schweiz, Horror Clown In Thun, Horror Clown In Frankrijk, Horror Clown In Frankreich, Horror Clown It, Horror Clown In Basel, Horror Clown In England, Horror Clown In Luxemburg, Horror Clown Jokes, Horror Clown Jack, American Horror Story Clown Jaw, Horror Clown John Wayne, Jeugdjournaal Horror Clown, Clown Horror Prank Jockiboi, Horror Clown Killer, Horror Clown Laugh, Horror Clown Luxemburg, Horror Clown Luxembourg, Horror Clown Lache, Clown Horror List, Horror Clown Movies List, Clown Horror Films List, Horror Movies Like Clown, American Horror Story Clown Lawsuit, Horror Clown Mask Latex, Horror Clown Movies, Horror Clown Movies 2016, Horror Clown Makeup, Horror Clown Movie 2017, Horror Clown Mask, Horror Clown Music, Horror Clown Movies On Netflix, Horror Clown Memes, Horror Clown Names, Horror Clown Nights, Horror Clown Night Game, Clown Horror Novels, Clown Horror Netflix, Clown Horror New, Horror Movie Clown Names, American Horror Clown Name, American Horror Clown No Mask, Horror Clown Movies New, Horror Clown Outfit, Horror Clown Movies On Netflix, Horror Movie Clown On Tricycle, Scary Clown On American Horror Story, Clown Horror Movies Online, Horror Movie With Clown On Cover, Clown Horror Watch Online, Horror Movies Of Clown, Creepy Clown On American Horror, Clown Horror Movie Watch Online, Horror Clown Pics, Horror Clown Prank, Horror Clown Props, Horror Clown Poem, Horror Clown Prosthetic, Horror Clown Photoshop, Horror Clown Pak, Horror Clown Face Paint, American Horror Clown Picture, Horror Movie Clown Puppet, Horror Clown Quotes, American Horror Story Clown Quotes, Horror Clown Real, Clown Horror Review, Clown Horror Rotten Tomatoes, Horror Film Clown Rocking Chair, American Horror Story Clown Real, American Horror Story Clown Running, American Horror Story Clown Real Person, American Horror Story Clown Real Face, Clown Horror Movie Dvd Release, Clown Horror Recensione, Horror Clown Stories, Scary Horror Clowns, Horror Story Clown Mask, Horror Clown Song, Horror Story Clown Statue, Horror Clown Sound, Horror Clown Suit, Scary Horror Clown Movies, Clown Horror Short Stories, Horror Movie Clown Scene, Horror Clown Tattoo, Horror Clown Top 10, Horror Clown Thun, Horror Clown Trailer, Horror Clown Tutorial, American Horror Clown Trailer, Horror Movie Clown Trailer, Moviepilot Horror Clown Trailer, Horror Movie The Clown, American Horror Story Clown, Horror Clown Masks Uk, Horror Clown Costumes Uk, Horror Film Clown Under Bed, Horror Movie Clown Under Bed, American Horror Story Clown Unmasked, American Horror Clown Makeup, Clown Upcoming Horror Movies, Horror Clown Makeup, Horror Clown Halloween Makeup, Horror Clown Uit Frankrijk, Horror Clown Videos, Horror Clown Videos Dailymotion, Horror Clown Verkleidung, American Horror Story Clown Video, American Horror Story Clown Vine, Halloween Horror Nights Clown Video, Horror Clown Tattoo Vorlagen, Horror Clown Versteckte Kamera, Horror Clown Vermoord, Horror Clown Verhalen, Horror Clown Wallpapers, Horror Clown Wiki, Horror Clown Woman, Horror Clown Wig, Horror Clown Womens Costume, Clown Horror Watch Online, Horror White Clown, American Horror Clown Without Mask, Horror Movie With Clown Doll, Horror Movie With Clown Killer, Horror Clown Youtube, Clown Horror Movies Youtube, American Horror Story Clown Youtube, Youtube Horror Clown Prank, Film Horror Sui Clown Yahoo, Film Horror Clown Yahoo, Horror Zombie Clown Mask, Clown Zombies Horror, Clown Horror Zwiastun, Horror Clown Zoetermeer, Rainer Von Holst Firmenwelten, Rainer Von Holst Gerlachreport, Rainer Von Holst Usa, Rainer Von Holst Gerlach, Rainer Von Holst Gomopa, Rainer Von Holst Iserlohn, Rainer Von Holst, Rainer Von Holst Bank, Rainer Von Holst Politico, Rainer Von Holst Augsburg, Rainer Von Holst Augsburg, Rainer Von Holst Bank, Rainer Von Holst Firmenwelten, Rainer Von Holst Gerlachreport, Rainer Von Holst Gerlach, Rainer Von Holst Gomopa, Rainer Von Holst Iserlohn, Rainer Von Holst Politico, Rainer Von Holst Princeton, Rainer Von Holst Usa, Rainer Von Holst Werther
4 comments:
Anonymous said…
Anonymous said…
see here said…
cyberzon said…
Post a Comment