<?xml version="1.0" encoding="utf8"?>
 <!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.0 20120330//EN" "http://jats.nlm.nih.gov/publishing/1.0/JATS-journalpublishing1.dtd"> <article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" article-type="review-article" dtd-version="1.0" xml:lang="en">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">JAFS</journal-id>
      <journal-title-group>
        <journal-title>Journal of Advanced Forensic Sciences</journal-title>
      </journal-title-group>
      <issn pub-type="epub">2692-5915</issn>
      <publisher>
        <publisher-name>Open Access Pub</publisher-name>
        <publisher-loc>United States</publisher-loc>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="doi">10.14302/issn.2692-5915.jafs-22-4131</article-id>
      <article-id pub-id-type="publisher-id">JAFS-22-4131</article-id>
      <article-categories>
        <subj-group>
          <subject>review-article</subject>
        </subj-group>
      </article-categories>
      <title-group>
        <article-title>The Computer Crimes of Vasiliy Gorshkov and Alexey Ivanov</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <name>
            <surname>Buresh</surname>
            <given-names>Donald L.</given-names>
          </name>
          <xref ref-type="aff" rid="idm1843196252">1</xref>
          <xref ref-type="aff" rid="idm1843204172">*</xref>
        </contrib>
      </contrib-group>
      <aff id="idm1843196252">
        <label>1</label>
        <addr-line>Morgan State University.</addr-line>
      </aff>
      <aff id="idm1843204172">
        <label>*</label>
        <addr-line>Corresponding author</addr-line>
      </aff>
      <author-notes>
        <corresp>
  Donald L. Buresh (PhD, JD, LL.M.) <addr-line>Morgan State University </addr-line><email>logansquaredon@sbcglobal.net</email></corresp>
        <fn fn-type="conflict" id="idm1843185620">
          <p>The authors have declared that no competing interests exist.</p>
        </fn>
      </author-notes>
      <pub-date pub-type="epub" iso-8601-date="2022-03-23">
        <day>23</day>
        <month>03</month>
        <year>2022</year>
      </pub-date>
      <volume>1</volume>
      <issue>2</issue>
      <fpage>27</fpage>
      <lpage>32</lpage>
      <history>
        <date date-type="received">
          <day>11</day>
          <month>03</month>
          <year>2022</year>
        </date>
        <date date-type="accepted">
          <day>22</day>
          <month>03</month>
          <year>2022</year>
        </date>
        <date date-type="online">
          <day>23</day>
          <month>03</month>
          <year>2022</year>
        </date>
      </history>
      <permissions>
        <copyright-statement>© </copyright-statement>
        <copyright-year>2022</copyright-year>
        <copyright-holder>Donald L. Buresh</copyright-holder>
        <license xlink:href="http://creativecommons.org/licenses/by/4.0/" xlink:type="simple">
          <license-p>This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.</license-p>
        </license>
      </permissions>
      <self-uri xlink:href="http://openaccesspub.org/jafs/article/1794">This article is available from http://openaccesspub.org/jafs/article/1794</self-uri>
      <abstract>
        <p>The purpose of this essay was to               document the cybercrimes of Vasiliy Gorshkov and Alexey Ivanov, starting from their humble                    beginnings in Chelyabinsk, Russia to their                 convictions for conspiracy, violations of the               Computer Fraud and Abuse Act, and other federal crimes. The paper outlines the history of these two individuals, describing the circumstances under which they were arrested and prosecuted. The essay concludes by observing that the mainstream media characterized Gorshkov and Ivanov as              villainous Russian hackers, whereas in reality, they were would-be Russian entrepreneurs attempting to earn their fortune by illicit means.</p>
      </abstract>
      <kwd-group>
        <kwd>Alexey Ivanov</kwd>
        <kwd>American exceptionalism</kwd>
        <kwd>Computer Fraud and Abuse Act</kwd>
        <kwd>Extra-Territorial Computer Searches</kwd>
        <kwd>Special Prosecutor Robert Mueller</kwd>
        <kwd>Vasiliy Gorshkov</kwd>
      </kwd-group>
      <counts>
        <fig-count count="0"/>
        <table-count count="0"/>
        <page-count count="6"/>
      </counts>
    </article-meta>
  </front>
  <body>
    <sec id="idm1843049460" sec-type="intro">
      <title>Introduction</title>
      <p>The purpose of this paper is to analyze the computer crimes of Vasiliy Gorshkov and Alexey Ivanov using a slight modification of the Valeriano and Maness criteria<xref ref-type="bibr" rid="ridm1850767980">1</xref> as what was accomplished by the author in a previous article regarding the            Estonian cyber incident<xref ref-type="bibr" rid="ridm1850764740">2</xref>. The analysis focuses on answering the following four questions<xref ref-type="bibr" rid="ridm1850776196">3</xref></p>
      <p>1. How did the crimes committed by Gorshkov and Ivanov come about?</p>
      <p>2. What were the legal, national, and international implications of the crimes committed by Gorshkov and Ivanov?</p>
      <p>3. What was the impact of the crimes committed by Gorshkov and Ivanov? and</p>
      <p>4. What was the reaction to the crimes committed by Gorshkov and Ivanov on the national and           international levels?</p>
      <p>There are four actors involved in the of the crimes committed by Gorshkov and Ivanov–Vasiliy Gorshkov, Alexey Ivanov, the Federal Bureau of              Investigation (FBI), and the victims of Gorshkov’s and Ivanov’s crimes. The paper does not address the             actions of the victims of Gorshkov’s and Ivanov’s crimes, nor does it consider in any great depth the relationship between Gorshkov and Ivanov. Rather, it concentrates on the relationship between Gorshkov and the FBI, and Ivanov and the FBI. The paper concludes by observing that it was entirely appropriate for Gorshkov and Ivanov to be prosecuted in the United States. Finally, it is entirely possible that Gorshkov, Ivanov, or both were involved in providing technical assistance to Special               Prosecutor Robert Mueller indicted 12 Russian hackers, each one individually named in the complaint<xref ref-type="bibr" rid="ridm1850846892">4</xref>.</p>
      <sec id="idm1843048956">
        <title>How Did the Crimes Committed by Gorshkov and Ivanov Come About?</title>
        <p>In this section, the facts of Gorshkov’s and Ivanov’s crimes are outlined. Gorshkov’s case is discussed in some detail. Finally, the Ivanov’s case is outlined,       describing the charges and the results of the court            proceedings.</p>
      </sec>
      <sec id="idm1843048884">
        <title>A Short History about Gorshkov and Ivanov</title>
        <p>The mainstream media is alive these days with tales of Russian hacking of American companies, political parties, and the federal government<xref ref-type="bibr" rid="ridm1850871660">5</xref>. These hackers have been involved in some extremely large cybercrimes. For example, in 2014, Russian Federal Security Service (FSB) officers Dmitry Dokuchaev and Igor Sushchin were convicted of hacking over one billion Yahoo! Accounts<xref ref-type="bibr" rid="ridm1850622116">6</xref>. Another example of Russian hacking occurred when Sasha Panin hacked over one million computer systems and stole credit card and bank account information<xref ref-type="bibr" rid="ridm1850627804">7</xref>. </p>
        <p>In 1999 and 2000, Vasiliy Gorshkov and Alexey Ivanov were two young Russians actively engaged in       cybercrime<xref ref-type="bibr" rid="ridm1850625068">8</xref>. Gorshkov and Ivanov grew up in               Chelyabinsk, one of the most polluted places on the planet due to a mysterious explosion in a nuclear-bomb-making factory in the 1950s<xref ref-type="bibr" rid="ridm1850599012">9</xref>. Gorshkov was a troubled youth even though he was a computer whiz because played with the computers in his mother’s office<xref ref-type="bibr" rid="ridm1850597212">10</xref> . After failing the exams at Southern Ural State University, Gorshkov           affiliated himself with a group of hackers that called    themselves the Expert Group of Protection Against        Hackers<xref ref-type="bibr" rid="ridm1850596492">11</xref>. The group consisted of cells of two or three hackers and paid a 30 percent protection fee to an            unknown entity<xref ref-type="bibr" rid="ridm1850594836">12</xref>. Gorshkov coordinated one of these cells, where Ivanov and another programmer called         Michael were members<xref ref-type="bibr" rid="ridm1850593900">13</xref>.</p>
        <p>In 2000, life was good for these two hackers. Gorshkov and Ivanov would hack into a supposedly secure network in the United States, explain to the network        administrators when they had just done, and then offer to fix the problem for a price<xref ref-type="bibr" rid="ridm1850589772">14</xref>. The companies paid the programmers in cash ranging from $80 to $4,000<xref ref-type="bibr" rid="ridm1850587540">15</xref>. Cognizant Technology Solutions (CTS), headquartered in Seattle, Washington, even gave the hackers storage space on its servers<xref ref-type="bibr" rid="ridm1850587900">16</xref>. </p>
        <p>In June 2000, Gorshkov received an email from Seattle company called Invita Security, asking him        whether he would like to work for a cybersecurity           company in America<xref ref-type="bibr" rid="ridm1850583940">17</xref>. Gorshkov jumped at the             opportunity, traveling with Ivanov for 48 hours to          interview with the company<xref ref-type="bibr" rid="ridm1850562004">18</xref>. At the interview, the two hackers demonstrated their hacking skills, and the two programmers logged into their computers in                     Chelyabinsk<xref ref-type="bibr" rid="ridm1850562076">19</xref>. When the meeting was over, they were driven back to their hotel<xref ref-type="bibr" rid="ridm1850559772">20</xref>. The car then stopped          suddenly, the doors were opened, and several FBI officers arrested them.<xref ref-type="bibr" rid="ridm1850558116">21</xref></p>
        <p>When Speakeasy, a Seattle-based Internet service provider, had been victimized, the FBI created Operation Flyhook, a surveillance operation to arrest and then        prosecute cyber criminals<xref ref-type="bibr" rid="ridm1850554876">23</xref><xref ref-type="bibr" rid="ridm1850551564">24</xref>. The idea was to lure hackers to the United States by offering hackers                  employment at a fake cybersecurity company. Because many Russian hackers were young technologists with little income, the opportunity to work in America was                irresistible<xref ref-type="bibr" rid="ridm1850551924">25</xref>. Even though Gorshkov and Ivanov were making a good living in Russia scamming and extorting money from American companies, the temptation to work for a company like Amazon or Google was bait too good to pass up<xref ref-type="bibr" rid="ridm1850550700">26</xref>. Gorshkov and Ivanov took the bait, hook, line, and sinker.</p>
      </sec>
      <sec id="idm1843046148">
        <title>Vasiliy Gorshkov’s Case</title>
        <p>Gorshkov was tried and convicted of 20 counts of conspiracy, and a variety of computer crimes against the Speakeasy Network of Seattle, Washington<xref ref-type="bibr" rid="ridm1850564668">27</xref>. Gorshkov’s attorney, Kenneth Kanev, attempted to block the use of data from the hacker’s servers in Russia<xref ref-type="bibr" rid="ridm1850532436">28</xref>. After Gorshkov and Ivanov were arrested, the FBI              proceeded to download 1.3 to 2.7 gigabytes of data from the hacker’s servers that were located in Russia<xref ref-type="bibr" rid="ridm1850529412">29</xref><xref ref-type="bibr" rid="ridm1850527324">30</xref>. A warrant was issued to the FBI ten days after the download occurred<xref ref-type="bibr" rid="ridm1850524732">31</xref>. While the two Russian hackers were demonstrating their talents to the FBI agents posing in Invita hiring managers, a keyboard sniffer was installed on their machines unbeknownst to Gorshkov and Ivanov,    recording every keystroke<xref ref-type="bibr" rid="ridm1850540356">32</xref>. Because the Russian        servers were located in Chelyabinsk, Kanev argued that the FBI violated Gorshkov’s Fourth Amendment                rights<xref ref-type="bibr" rid="ridm1850540500">33</xref>. Four years later, the Supreme Court opined that no search warrant was necessary when American law enforcement a non-U.S. citizen’s residence in a foreign country<xref ref-type="bibr" rid="ridm1850536036">34</xref>. Gorshkov was sentenced to three years in prison and ordered to pay $692,000 in restitution<xref ref-type="bibr" rid="ridm1850535676">35</xref>.</p>
      </sec>
      <sec id="idm1843047444">
        <title>Alexey Ivanov’s Case</title>
        <p>Ivanov was indicted in Connecticut for charges of conspiracy, computer fraud, extortion, and possession of illegal access devices under the Computer Fraud and Abuse Act (CFAA)<xref ref-type="bibr" rid="ridm1850503052">36</xref><xref ref-type="bibr" rid="ridm1850501036">37</xref>. Had Ivanov been convicted on all counts, he could have spent up to 90 years in              prison<xref ref-type="bibr" rid="ridm1850501252">38</xref>. After the indictment was handed down by the court, Ivanov filed a motion to dismiss all charges because he was physically located in Russia, not the United States when the offenses occurred, and thus he could not be charged with violating United States law. The federal        district court denied Ivanov’s motion because the harm resulting from Ivanov’s action occurred in the United States and because the statutes under which he was charged were intended by Congress to apply                       extraterritorially. The court cited <italic>Muench</italic> which opined that when the intent is to cause harm inside the United States by individuals outside this country, the United States Law can be successfully applied against these          individuals<xref ref-type="bibr" rid="ridm1850497580">39</xref>. The court also cited <italic>Steinberg</italic>, where it concluded that there is ample precedent that a person could be charged where the harm occurs even if the          individual was not physically present in the jurisdiction where the harm took place<xref ref-type="bibr" rid="ridm1850495276">40</xref>. The court noted that the computers were located in Vernon, Connecticut where the illegal access occurred, and that there is legislative             evidence indicating that the statues under which Ivanov was indicted were meant to apply .extraterritorially. At trial, Ivanov was sentenced to three years and eight months in prison and required to pay $800,000 in               restitution<xref ref-type="bibr" rid="ridm1850493980">41</xref>.</p>
        <p>At a later date, Ivanov pleaded guilty to several of the charges and was sentenced to four years in prison    followed by three months of supervised release. Ivanov was prosecuted and convicted in California<xref ref-type="bibr" rid="ridm1850506652">42</xref>, New        Jersey<xref ref-type="bibr" rid="ridm1850504852">43</xref>, and Washington<xref ref-type="bibr" rid="ridm1850484116">44</xref> for similar crimes. In       total, Ivanov was tried in five federal district courts for computer crime.</p>
        <p>One event that deserves to be mentioned is that the FBI agent who was responsible for Operation Flyhook, Michael Schuler, was charged unauthorized access to    computer information by Russia’s FSB<xref ref-type="bibr" rid="ridm1850483468">45</xref>. The purpose of the Russian complaint was to assert Russian                         sovereignty<xref ref-type="bibr" rid="ridm1850481884">46</xref>. If the long-arm of American law can reach into another country, entice foreign nationals to come to the United States, and then arrest and prosecute them, it is apparent that the Russian Federation felt no restraint in doing the same to an American citizen<xref ref-type="bibr" rid="ridm1850479148">47</xref>. In Gorshkov’s trial, the federal district court ruled that Russian law does not apply to American agents<xref ref-type="bibr" rid="ridm1850477852">48</xref>. </p>
      </sec>
      <sec id="idm1843044924">
        <title>What Were the Legal, National, and International                 Implications of the Crimes Committed by Gorshkov and Ivanov?</title>
        <p>The issue with the outcome of these two cases is that in the future other countries will feel no compunction to searching servers located in America<xref ref-type="bibr" rid="ridm1850477708">49</xref>. The United States courts have opined that America law has personal jurisdiction extraterritorially<xref ref-type="bibr" rid="ridm1850474252">50</xref>. In contrast, the federal district has opined that Russian law, and probably the laws of any other nation, does not apply to American agents<xref ref-type="bibr" rid="ridm1850472596">51</xref>. This result is the most likely an outgrowth of American exceptionalism, where the United States can do what it wants, where it wants, when it wants, to            whomever it wants, and however it wants<xref ref-type="bibr" rid="ridm1850484980">52</xref>. The issue with the ideology is that the United States is unique among nations in that it presumes that America has a right to   exist and that no other nation can question its actions<xref ref-type="bibr" rid="ridm1850453740">53</xref>. </p>
        <p> The alleged Russian hack of the servers of the Democratic National Committee (DNC) can be viewed as a negative response to American exceptionalism, where the United States holds other countries to standards that it rejects for itself<xref ref-type="bibr" rid="ridm1850451508">54</xref>. It should be remembered that in        Special Prosecutor Robert Mueller’s indictment of 12        Russians, each one of the Russians was specifically named, the address of where the hack occurred in St. Petersburg was specified, and a declaration of their rank in the        Russian military was stated<xref ref-type="bibr" rid="ridm1850449060">55</xref>. The question that begs to be asked is: How did Muller’s team find out this                 information? It is more than probable that the Russian military computers were hacked in violation of Russian law<xref ref-type="bibr" rid="ridm1850446612">56</xref>. It serves as a striking example of American           exceptionalism, where the rule is: Do as I say, not as I do.</p>
      </sec>
      <sec id="idm1843027092">
        <title>What Was the Impact of the Crimes Committed by Gorshkov and Ivanov?</title>
        <p>According to Lemos, the cases against Gorshkov and Ivanov were extremely dangerous because they open Pandora’s box where in the future, individuals as well as corporations could be criminally charged for conducting corporate espionage, particularly if the entities are          headquartered in different countries<xref ref-type="bibr" rid="ridm1850443084">57</xref>. In many cases, the CFAA exempts law enforcementofficers from being prosecuted if they engage in an unauthorized entry into a computer<xref ref-type="bibr" rid="ridm1850443948">58</xref>. Unauthorized entry can be compared to an FBI officer driving a car beyond the speed limit to in          pursuit of a criminal. Any evidence obtained when law enforcement breaks the law in performance of their duties is admissible in court<xref ref-type="bibr" rid="ridm1850440996">59</xref>.</p>
        <p>When evidence is obtained from a foreign            country, diplomatic channels are used with all of its           niceties<xref ref-type="bibr" rid="ridm1850440492">60</xref>. The issue with employing formal                      communications with other nations is the length of time it takes to receive the desired evidence, sometimes as long as six months<xref ref-type="bibr" rid="ridm1850438332">61</xref>. In the Gorshkov and Ivanov cases, a six month wait would have been too long. According to the court papers, the password to one Ivanov’s accounts was changed six days after the two Russians were                       arrested<xref ref-type="bibr" rid="ridm1850437036">62</xref>. The issue with asking a foreign country to help the United States in convicting a cyber criminal           located in another country is that it takes weeks and more likely months for the other nation to collect the requisite evidence<xref ref-type="bibr" rid="ridm1850433940">63</xref>. Simply stated, such efforts take too much time because the United States is waiting for the evidence, it can be permanently deleted, thereby thwarting the            prosecution of cybercriminals.</p>
      </sec>
    </sec>
    <sec id="idm1843027380" sec-type="conclusions">
      <title>Conclusions</title>
      <p>When Gorshkov and Ivanov were arrested, they were young adults in their twenties who were living in a country with few rules and regulations<xref ref-type="bibr" rid="ridm1850433292">64</xref>. They were technologists who were intensely curious about                  computing<xref ref-type="bibr" rid="ridm1850433508">65</xref>. They were not two evil Russian villains as characterized by the American mainstream media<xref ref-type="bibr" rid="ridm1850431132">66</xref>. They saw themselves as entrepreneurs attempting to make their fortune in the rough and tumble world of           Eastern Russia<xref ref-type="bibr" rid="ridm1850428756">67</xref>. Should they have been prosecuted in the United States? According to American law, the answer is yes. What is interesting to note is that Gorshkov went back to Russia, while Ivanov stayed in the United States and is now working in New England and living more or less the American Dream<xref ref-type="bibr" rid="ridm1850427532">68</xref>. It could only happen in America!</p>
    </sec>
    <sec id="idm1843027308">
      <title>Miscellaneous Considerations</title>
      <sec id="idm1843026588">
        <title>Author Contributions</title>
        <p>The author has read and agreed to the published version of the manuscript.</p>
      </sec>
    </sec>
    <sec id="idm1843027452">
      <title>Funding</title>
      <p>This research received no external funding.</p>
    </sec>
    <sec id="idm1843024500">
      <title>Institutional Review Board Statement</title>
      <p>Not applicable.</p>
    </sec>
    <sec id="idm1843024428">
      <title>Informed Consent Statement</title>
      <p>Not applicable.</p>
    </sec>
    <sec id="idm1843024572">
      <title>Acknowledgments</title>
      <p>Not applicable.</p>
      <p>The following abbreviations are used in this manuscript</p>
      <sec id="idm1843022988">
        <title>Abbreviations</title>
        <p>CFAA-Computer Fraud and Abuse Act</p>
        <p>DNC-Democratic National Committee</p>
        <p>FBI-Federal Bureau of Investigation</p>
        <p>FSB-Russian Federal Security Service</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ridm1850767980">
        <label>1.</label>
        <mixed-citation xlink:type="simple" publication-type="book">
          <name>
            <surname>Valeriano</surname>
            <given-names>B</given-names>
          </name>
          <name>
            <surname>Maness</surname>
            <given-names>R C</given-names>
          </name>
          <chapter-title>(2015).CyberWar versus Cyber Realities: Cyber Conflict in the International System</chapter-title>
        </mixed-citation>
      </ref>
      <ref id="ridm1850764740">
        <label>2.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Donald</surname>
            <given-names>L Buresh</given-names>
          </name>
          <article-title>Evaluation of the Estonian Cyber Incident</article-title>
          <date>
            <year>2020</year>
          </date>
          <source>J. of Adv, Forensic Sci</source>
          <volume>1</volume>
          <fpage>2</fpage>
          <lpage>7</lpage>
        </mixed-citation>
      </ref>
      <ref id="ridm1850776196">
        <label>3.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <source>Valeriano &amp; Maness, supranote</source>
          <volume>1</volume>
        </mixed-citation>
      </ref>
      <ref id="ridm1850846892">
        <label>4.</label>
        <mixed-citation xlink:type="simple" publication-type="book">
          <chapter-title>Netkysho.1: 18-cr-00215(D. Ct. D.C. 2018), United States</chapter-title>
        </mixed-citation>
      </ref>
      <ref id="ridm1850871660">
        <label>5.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <article-title>Raymond Pompon,Russian Hackers, Face to Face</article-title>
          <date>
            <year>2017</year>
          </date>
          <publisher-loc>F5 Labs. https://www.f5.com/labs/articles/threat-intelligence/russian-hackers-face-to-face</publisher-loc>
        </mixed-citation>
      </ref>
      <ref id="ridm1850622116">
        <label>6.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Dept</surname>
            <given-names/>
          </name>
          <article-title>of Justice Staff, U.S. Charges Russian FSB Officers and Their Criminal Conspirators for Hacking Yahoo and Millions of Email Accounts</article-title>
          <institution>United States Department of Justice</institution>
          <publisher-loc>https://www.justice.gov/opa/pr/us-charges-russian-fsb-officers-and-their-criminal-conspirators-hacking-yahoo-and-millions</publisher-loc>
        </mixed-citation>
      </ref>
      <ref id="ridm1850627804">
        <label>7.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
		<article-title>Panin, Ct. Doc. No. 1:11-CR-0557-AT-AJB (N. D. Geo. 2016), https://www.courtlistener.com/docket/4242291/united-states-v-panin/. United States </article-title>



</mixed-citation>
      </ref>
      <ref id="ridm1850625068">
        <label>8.</label>
        <mixed-citation xlink:type="simple" publication-type="journal"><name><surname>Jahnke</surname><given-names>Art</given-names></name><article-title>(2005).AlexeyIvanov andVasilyGorshkov: Russian Hacker Roulette</article-title>
CSO Online, https://www.csoonline.com/article/2118241/malware-cybercrime/alexey-ivanov-and-vasiliy-gorshkov--russian-hacker-roulette.html



</mixed-citation>
      </ref>
      <ref id="ridm1850599012">
        <label>9.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <article-title>Ariana Eunjung Cha,Internet Dreams Turn to Crime, The Washington Post</article-title>
          <date>
            <year>2003</year>
          </date>
        </mixed-citation>
      </ref>
      <ref id="ridm1850597212">
        <label>10.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1850596492">
        <label>11.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1850594836">
        <label>12.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1850593900">
        <label>13.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1850589772">
        <label>14.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Jahnke</surname>
            <given-names>supra</given-names>
          </name>
          <volume>8</volume>
        </mixed-citation>
      </ref>
      <ref id="ridm1850587540">
        <label>15.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1850587900">
        <label>16.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1850583940">
        <label>17.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Susan</surname>
            <given-names>W Brenner</given-names>
          </name>
          <name>
            <surname>Joseph</surname>
            <given-names>J Schwerha</given-names>
          </name>
          <article-title>Havens: Challenges and Solutions</article-title>
          <date>
            <year>2007</year>
          </date>
          <publisher-loc>American Bar Association, https://heinonline.org/HOL/LandingPage?handle=hein.journals/busiltom17&amp;div=31&amp;id=&amp;page=</publisher-loc>
        </mixed-citation>
      </ref>
      <ref id="ridm1850562004">
        <label>18.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <source>Jahnke supra note</source>
          <volume>8</volume>
        </mixed-citation>
      </ref>
      <ref id="ridm1850562076">
        <label>19.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1850559772">
        <label>20.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1850558116">
        <label>21.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1850553940">
        <label>22.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1850554876">
        <label>23.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <article-title>Pompon supra note 1</article-title>
        </mixed-citation>
      </ref>
      <ref id="ridm1850551564">
        <label>24.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1850551924">
        <label>25.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1850550700">
        <label>26.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <source>Jahnke supra note</source>
          <volume>8</volume>
        </mixed-citation>
      </ref>
      <ref id="ridm1850564668">
        <label>27.</label>
        <mixed-citation xlink:type="simple" publication-type="journal"><name><surname>Leyden</surname><given-names>John</given-names></name><article-title>(2002).Russians Accuse FBI Agent of Hacking, The Register</article-title>
https://www.theregister.co.uk/2002/08/16/russians_accuse_fbi_agent/



</mixed-citation>
      </ref>
      <ref id="ridm1850532436">
        <label>28.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1850529412">
        <label>29.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Lemos</surname>
            <given-names>Robert</given-names>
          </name>
          <article-title>Hack” Raises Global Security Concerns</article-title>
          <date>
            <year>2002</year>
          </date>
          <publisher-loc>Cnet, https://www.cnet.com/news/fbi-hack-raises-global-security-concerns/</publisher-loc>
        </mixed-citation>
      </ref>
      <ref id="ridm1850527324">
        <label>30.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <source>Jahnke supra note</source>
          <volume>8</volume>
        </mixed-citation>
      </ref>
      <ref id="ridm1850524732">
        <label>31.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Attfield</surname>
            <given-names>Philip</given-names>
          </name>
          <article-title>(2005).UnitedStates vGorshkov- Detailed Forensics and Case Study; Expert Witness Perspective</article-title>
          <fpage>1592518</fpage>
          <publisher-name>IEEE</publisher-name>
        </mixed-citation>
      </ref>
      <ref id="ridm1850540356">
        <label>32.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <source>Lemos, supra note</source>
          <volume>25</volume>
        </mixed-citation>
      </ref>
      <ref id="ridm1850540500">
        <label>33.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1850536036">
        <label>34.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1850535676">
        <label>35.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Janke</surname>
            <given-names/>
          </name>
          <article-title>supra note 8</article-title>
        </mixed-citation>
      </ref>
      <ref id="ridm1850503052">
        <label>36.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1850501036">
        <label>37.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <article-title>18 U.S.C. § 1030.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ridm1850501252">
        <label>38.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <article-title>Janke supra note 8</article-title>
        </mixed-citation>
      </ref>
      <ref id="ridm1850497580">
        <label>39.</label>
        <mixed-citation xlink:type="simple" publication-type="journal"><date><year>1998</year></date>
United States v. Muench. 97-2304 https://caselaw.findlaw.com/us-11th-circuit/1107178.html



</mixed-citation>
      </ref>
      <ref id="ridm1850495276">
        <label>40.</label>
        <mixed-citation xlink:type="simple" publication-type="journal"><article-title>United States v</article-title><date><year>1932</year></date>
Steinberg,62F.2d77 https://law.justia.com/cases/federal/appellate-courts/F2/62/77/1472534/



</mixed-citation>
      </ref>
      <ref id="ridm1850493980">
        <label>41.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <article-title>Janke supra note 8</article-title>
        </mixed-citation>
      </ref>
      <ref id="ridm1850506652">
        <label>42.</label>
        <mixed-citation xlink:type="simple" publication-type="journal"><name><surname>Morin</surname><given-names>Monte</given-names></name><article-title>U.S. Indicts Russian Citizen in Hacking Case, The Los Angeles Times</article-title><date><year>2001</year></date>
https://www.latimes.com/archives/la-xpm-2001-jun-21-me-13124-story.html



</mixed-citation>
      </ref>
      <ref id="ridm1850504852">
        <label>43.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>ABC</surname>
            <given-names>News Staff</given-names>
          </name>
          <article-title>Russians Busted on Hacking Charges, ABC News</article-title>
          <date>
            <year>2006</year>
          </date>
        </mixed-citation>
      </ref>
      <ref id="ridm1850484116">
        <label>44.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1850483468">
        <label>45.</label>
        <mixed-citation xlink:type="simple" publication-type="journal"><name><surname>Brunker</surname><given-names>Mike</given-names></name><date><year>2002</year></date>
FBI Agent Charged with Hacking, NBC News. http://www.nbcnews.com/id/3078784#.XFpG56D45mM



</mixed-citation>
      </ref>
      <ref id="ridm1850481884">
        <label>46.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <article-title>Leyden supra note 23</article-title>
        </mixed-citation>
      </ref>
      <ref id="ridm1850479148">
        <label>47.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1850477852">
        <label>48.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1850477708">
        <label>49.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <article-title>Lemos supra note 25</article-title>
        </mixed-citation>
      </ref>
      <ref id="ridm1850474252">
        <label>50.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>United</surname>
            <given-names>States v</given-names>
          </name>
          <name>
            <surname>Ivanov</surname>
            <given-names/>
          </name>
          <volume>175</volume>
          <fpage>370</fpage>
        </mixed-citation>
      </ref>
      <ref id="ridm1850472596">
        <label>51.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <article-title>Leyden supra note 23</article-title>
        </mixed-citation>
      </ref>
      <ref id="ridm1850484980">
        <label>52.</label>
        <mixed-citation xlink:type="simple" publication-type="journal"><name><surname>Tyrrell</surname><given-names>Ian</given-names></name><article-title>What, Exactly, Is ‘American Exceptionalism’?, The Week</article-title><date><year>2016</year></date>
https://theweek.com/articles/654508/what-exactly-american-exceptionalism



</mixed-citation>
      </ref>
      <ref id="ridm1850453740">
        <label>53.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1850451508">
        <label>54.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Maté</surname>
            <given-names>Aaron</given-names>
          </name>
          <article-title>The Elite Fixation with Russiagate, The Nation</article-title>
          <date>
            <year>2018</year>
          </date>
          <fpage>https://www.thenation.com/article/elite-fixation-russiagate/.</fpage>
        </mixed-citation>
      </ref>
      <ref id="ridm1850449060">
        <label>55.</label>
        <mixed-citation xlink:type="simple" publication-type="journal"><name><surname>Netkysho</surname><given-names>United States v</given-names></name>

supra, note 3



</mixed-citation>
      </ref>
      <ref id="ridm1850446612">
        <label>56.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <article-title>Maté supr note 44</article-title>
        </mixed-citation>
      </ref>
      <ref id="ridm1850443084">
        <label>57.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <article-title>Lemos supra note 29</article-title>
        </mixed-citation>
      </ref>
      <ref id="ridm1850443948">
        <label>58.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1850440996">
        <label>59.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1850440492">
        <label>60.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1850438332">
        <label>61.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1850437036">
        <label>62.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1850433940">
        <label>63.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1850433292">
        <label>64.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <article-title>Cha supra note 5</article-title>
        </mixed-citation>
      </ref>
      <ref id="ridm1850433508">
        <label>65.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <article-title>Pompon supra note 1</article-title>
        </mixed-citation>
      </ref>
      <ref id="ridm1850431132">
        <label>66.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1850428756">
        <label>67.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1850427532">
        <label>68.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <article-title>Janke supra note 8</article-title>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>
