A hacker known as "Track2" helped steal more than 200,000 credit card numbers from small retailers across the United States and sold them online to other criminals for more than $2 million, according to a federal indictment.
"This is a very, very famous hacker," said Arkady Bukh , a Brooklyn-based defense attorney. "... That person deserves to be sentenced to a very, very long jail time. It's not a question."
The real question, Bukh said, is whether federal prosecutors can prove that Track2 is Roman Seleznev, the son of a Russian parliament member who was captured in the Maldives this month and taken to the U.S. territory of Guam, where he was charged with 29 computer-related crimes.
Bukh, 41, would know the distinction. He has represented more than a dozen major hacking defendants, as well as arms dealers, human smugglers and child porn purveyors. He represents one of Seleznev's co-defendants.
Thanks to taking on high-profile cases, Bukh is becoming better known. Last week, he was in Boston defending Azamat Tazhayakov, a college student from Kazakhstan charged with obstructing the investigation of Boston Marathon bombing suspect Dzhokar Tsarnaev. The government accused Tazhayakov of tossing out a backpack and fireworks that Tsarnaev left behind in his dorm room.
Bukh has an office on Manhattan's Wall Street and hangs his shingle on a two-story house with pink trim in Brooklyn's Sheepshead Bay neighborhood, a working-class area popular among Russian immigrants. A store awning down the street advertises headstones with Cyrillic letters.
He was born near Moscow, but his family moved to Israel. He moved to New York in 1992. He lives on Staten Island with his wife, who is a doctor, and their two children.
Bukh, who speaks with a heavy Russian accent, completed the foreign lawyer program at New York Law School. He talks with hackers and advertises his legal services in chat rooms on the hidden Internet. Many of his federal cases end in plea agreements, and Bukh boasts online about winning reduced sentences for hacker clients.
"Even in those cases where (hackers) are known to the government, to know and to prove it may be a huge difference," Bukh told the Trib. "Specifically, when we're talking about Russia, we're talking about someone sitting behind his computer, and it's hard to prove this is exactly the person and not his brother, not his niece and not his father playing on that computer."
Federal investigators in Pittsburgh indicted Russian Evgeniy Bogachev on hacking charges last month, but used only nicknames for four other hackers in a related civil suit.
The FBI continues to work at putting names to those nicknames, said FBI special agent J. Keith Mularski, the cyber crimes supervisor who led the investigation from Pittsburgh.
"It can be very hard because when you think about it, the good hackers are going to use many different layers of anonymity," Mularski told the Trib. "It is very difficult, especially if they really keep their criminal persona free from their real-person person."
Though Bukh is not representing Bogachev, federal records show that his client list includes major hackers:
In all, Tsastsin's crew made at least $14 million, prosecutors say. Tsastsin was arrested in Estonia, and the United States is seeking his extradition.
Online hacking cases are tough for investigators because criminals can easily cover their tracks, legal experts agree. Even when the trail leads to a single computer, it can be hard to prove who was at the keyboard.
"We really haven't settled on what the burden of proof should be on how we attribute these cyber attacks back to a given individual or a given entity," said Scott Shackelford, a law professor and senior fellow at the Center for Applied Cybersecurity Research at Indiana University. "It's really unsettled in international law, and to a certain extent, it's unsettled in domestic law, too."
To make a case, the FBI looks for similarities in the habits of a hacker's online persona and a real-world suspect, Mularski said. That means tracking where the person accesses the Web, the operating system he uses and what he does online. If a hacker slips up, investigators might be able to identify his computer's unique Internet protocol address.
"It may all be circumstantial, but then you get a preponderance of circumstantial evidence, that then may be able to lead to probable cause for a search warrant," Mularski said.
Often, investigators are forced to wait until the hacker makes a mistake, said Daniel Garrie, executive managing partner of Law & Forensics, an Internet security firm in New York. That means researching online histories for an instance when the suspect used his real name, or chatting with criminals online until the suspect says something revealing.
"They're using social engineering," Garrie said. "Nobody's perfect, right? So you sit and you have a conversation. You talk to somebody. It's just one little slip-up or exposure."
Mularski agreed that even the most-sophisticated criminals leave a trail.
"You can be as anonymous as you want, but you're always still leaving things," Mularski said. "As a hacker doing criminal activity, you've got to be perfect every time."
Based on his experience, Bukh said Russian hackers seem to be getting angrier as the United States steps up enforcement. Criminals break into computers to steal money, he said, but many do it for pride, too.
Cartoon videos online feature one of Bukh's clients, Vladislav Horohorin, 31, a Russian known as "BadB" who pleaded guilty to selling stolen credit card numbers. One video shows former President George W. Bush finding out his bank account has been emptied, and another has Russian President Vladimir Putin handing out medals to hackers.
Horohorin was arrested in Nice, France, in 2010 and taken to Washington for trial. He pleaded guilty to two counts and is serving 88 months in a Connecticut federal prison.
"The government is doing what they can," Bukh said, "but surely now the hackers are trying to steal as much as they can."
©2014 The Pittsburgh Tribune-Review (Greensburg, Pa.)
NEW ON THE PODCAST