Using the Internet is leaving tremendous amount of the identity information about the person who accessed. Perhaps it may not be an issue if this information were not used against this person. However, this is a wrong impression of anonymity of the online users who have formed by the users themselves trying to achieve Internet anonymity to ensure privacy. Most of the time the users are not aware of two types of information that can be gathered online: the information that software is gathering from the users and the information that every person leaves about himself, or herself. My research includes reviewing of the United States and Washington state cyber-crime law, developing a new model of cyber-crime investigation procedure and suspect’s profiling, mapping modern techniques of revealing the Internet identity, and developing a prototype of a software application Cyber Bounty Hunter with usage of Python and C++ programming languages. I created Cyber Bounty Hunter as all-in-one tool for tracing suspects via IP-address, HTTP cookies, flash cookies, tracking bugs, HTTP referrer, TCP protocol, browser plugins, search engine's queries, social networks and so on. All of these tools and options can be used in cyber-crime scene investigation applying to tracking of suspects and fugitives, analysis of crime profiler and suspects’ identity. Cyber technologies opened up new possibilities in tracking. Generally, Cyber Bounty Hunter application software deploys cyber-espionage techniques and is capable of tracking and profiling suspects such as professional hackers, thefts, cyber-stalkers, cyber pedophiles, electronic terrorists and vandals.