Schweitzer Fachinformationen
Wenn es um professionelles Wissen geht, ist Schweitzer Fachinformationen wegweisend. Kunden aus Recht und Beratung sowie Unternehmen, öffentliche Verwaltungen und Bibliotheken erhalten komplette Lösungen zum Beschaffen, Verwalten und Nutzen von digitalen und gedruckten Medien.
Hands-on guidance for professionals investigating crimes that include cryptocurrency
In There's No Such Thing as Crypto Crime: An Investigators Guide, accomplished cybersecurity and forensics consultant Nick Furneaux delivers an expert discussion of the key methods used by cryptocurrency investigators, including investigations on Bitcoin and Ethereum type blockchains. The book explores the criminal opportunities available to malicious actors in the crypto universe, as well as the investigative principles common to this realm.
The author explains in detail a variety of essential topics, including how cryptocurrency is used in crime, exploiting wallets, and investigative methodologies for the primary chains, as well as digging into important areas such as tracing through contracts, coin-swaps, layer 2 chains and bridges. He also provides engaging and informative presentations of:
An essential and effective playbook for combating crypto-related financial crime, There's No Such Thing as Crypto Crime will earn a place in the libraries of financial investigators, fraud and forensics professionals, and cybercrime specialists.
NICK FURNEAUX is a cybersecurity and forensics consultant specializing in the prevention and investigation of cybercrime. Nick is author of the 2018 book Investigating Cryptocurrencies and has trained thousands of investigators in the skills needed to track cryptocurrency used in crimes. He works within the training academy at TRM Labs, and is an advisor to the Board of Asset Reality.
Foreword xiii
Introduction xvii
1 A History of Cryptocurrencies and Crime 1
Where Did It All Start? 3
The Rise of the Smart Contract 7
The Next Targets? 14
The Future? More Crime! 16
2 Understanding the Criminal Opportunities: Money Laundering 19
There Is No Such Thing as Crypto Crime 36
Money Laundering 40
What Is an Investigator Looking For? 42
Centralized Exchanges 43
NFTs and NFT Gaming 45
Mixers 48
Decentralized Exchanges 53
Casinos. 56
Chain Hopping 57
Privacy Coins 59
Crypto ATMs 62
Peer-to-Peer Platforms 64
3 Understanding the Criminal Opportunities: Theft 67
Crypto Thefts 67
Social Engineering 67
Phishing 68
Hacks 71
Fraud 73
Rug Pull 74
Pig-Butchering/Romance Scams 76
Investment Scams 79
Support Scams 83
Simple Theft 84
Contract Manipulation 86
Fake Contracts 86
Exploiting the Contract 87
Phishing 89
Flash Loans 90
Playing by the Rules 92
Other Criminal Opportunities 96
Yield Farming 96
Funding of Groups 97
Sanctions Avoidance 99
Summary 108
4 Who Should Be a Cryptocurrency Investigator? 109
Individual Skills 111
Knowledge of Technological Systems 111
Knowledge of Digital Currencies 112
Understanding of the Cryptocurrency Market 112
Extensive Knowledge of Computer Networks 113
Cryptography 114
Financial Crime 114
Fraud Investigators 114
Open Source Investigations 115
Cybercrime Investigations 116
Setting Up a Cryptocurrency Investigation Department 117
Other Roles. 123
5 The Role of Commercial Investigation Tools 125
Do You Need a Commercial Tool? 129
Two Is One and One Is None 133
The Future of Investigation Tools 135
6 Mining: The Key to Cryptocurrencies 139
What Really Is Mining? 141
Validating Transactions 141
Minting New Coins 142
Proof of Work (PoW) Mining 142
How PoW Mining Works 142
Energy Consumption and Environmental Concerns 145
Proof of Stake (PoS) Mining 146
How PoS Mining Works 146
Advantages of PoS Mining 146
Does an Investigator Need to Understand Mining Technologies? 146
Cryptocurrency Mining Frauds and Scams 147
Cloud Mining Scams 147
Ponzi and Pyramid Schemes 148
Malware and Cryptojacking 149
Asset Discovery 149
Will Cryptocurrencies Always Be Mined? 150
7 Cryptocurrency Wallets 153
When a Wallet Is Not Really a Wallet 155
Types of Cryptocurrency Wallets 156
Hot Wallets 157
Desktop Wallets. 157
Mobile Wallets 158
Web/Online Wallets 158
Cold Wallets 160
Hardware Wallets 160
Paper Wallets 161
Software Wallets: Functionality and Security 162
Functionality 163
Security 163
Hardware Wallets: Functionality and Security 164
Functionality 164
Security 164
Choosing the Right Wallet 165
Wallet Vulnerabilities 166
Weak or Reused Passwords 166
Phishing Attacks 166
Malware 167
On-Path Attacks 167
Vulnerable Wallet Software 168
Lack of Two-Factor Authentication (2FA) 168
Social Engineering 169
SIM-Swapping Attacks 169
Supply Chain Attacks 170
8 The Importance of Discovery 173
Premises Searching: Legal Framework and Search Powers 176
Search Strategies 177
Handling and Securing Evidence 177
Evidence Bags 178
Body Cameras 179
Photography 179
Chain of Custody 180
Physical Clues. 181
Hardware Wallets 181
Paper Wallets 183
QR Codes 186
Documentation 186
Questioning 188
General Understanding 188
Involvement and Knowledge of Cryptocurrencies 188
Specific Details of the Alleged Crime 189
Technical Details 189
Searching Digital Assets 190
Legal Framework and Warrants 192
Digital Forensics 194
Hardware Examination 198
Storage Devices 198
RAM Analysis 200
What are you looking for? 202
Handling and Securing Digital Evidence 204
The Role of Exchanges 204
Senior Officers/Management 206
Summary 206
9 The Workings of Bitcoin and Derivatives 209
Bitcoin Is a Blockchain-Based UTXO Cryptocurrency 210
UTXO 211
What Does an Transaction Look Like? 215
How Does a UTXO Blockchain Help an Investigator? 220
Blockchain Explorers 222
What Else Can You Learn in a Transaction? 226
Times and Dates 227
Values 229
Omni Layer 231
Taproot 232
The Lightning Network 235
Summary 237
10 Bitcoin: Investigation Methodology 239
Building an Investigation in Bitcoin 251
Address Clustering 253
How Are Clusters Defined? 255
Co-spend Heuristic 255
Change Analysis 256
Nominal Spend 257
Address Type Analysis 259
Multisig Analysis 260
Round Number Payments 261
Some Other Things to Note 262
Change of Ownership 263
Change of Wallet 263
Look at the Amounts 263
Address Triage 265
Attribution 271
Investigating Bitcoin 271
11 The Workings of Ethereum and Derivatives 273
History of the Ethereum Cryptocurrency 274
Ethereum Fundamentals 276
Types of Tokens 279
Ethereum Transaction Types 282
One Address for All Tokens 286
A User's Address Can Be the Same on Other Blockchains 288
Reading Basic Transactions 290
Transaction Methods 291
Transaction and Address Types 293
What Are These Contracts We Keep Mentioning? 294
Identifying Contract Transactions 295
Conclusion 296
12 Ethereum: Investigation Methodology 297
Following ETH-to-ETH Transactions 297
Smart Contracts Deep Dive 304
Methods, Functions, and Events 307
Code 309
Read Contract 310
Write Contract. 310
Logs 314
ETH-to-Contract Transactions 316
Token-to-Token Transactions 324
NFTs 329
Decentralized Exchanges 335
Reading Decentralized Finance Contracts 342
The Approve Transaction 351
Summary 353
13 Investigating Binance Smart Chain 355
What is Binance Smart Chain? 355
Investigating Funds on Binance Smart Chain 357
What Have You Learned? 364
14 Applying What You Have Learned to New Cryptocurrencies 367
Stable Coins Such as USDT, USDC, and Paxos 368
Tron 372
Tron Fee Structure 372
What Transactions Look Like 372
Layer 2 Chains 377
Bridges 383
Mixers 388
Bitcoin Mixing 389
Ethereum Mixing 393
Privacy Coins 395
Monero (XMR): The Vanguard of Privacy Coins 396
Zcash (ZEC): Selective Transparency 396
Dash (DASH): Privacy as an Option 397
Horizen (ZEN): Extended Privacy with Sidechains 397
Grin and Beam: Mimblewimble Protocol 398
What Have You Learned? 398
15 Open Source Intelligence and the Blockchain 401
Mindset 402
Just "Search Engine" It 404
Attribution of Individuals 412
NFT Metadata 421
OSINT and the Dark Web 423
Summary 425
16 Using Wallets for Investigations 427
Understanding Cryptocurrency Wallets 427
Seed Words and Wallet Recovery 428
Step-by-Step Guide to HD Wallet Re-creation 428
What Can Be Seen? 429
The Benefits of Wallet Re-creation in Investigations 434
Understanding Derivation Paths in Cryptocurrency Wallets 435
The Importance of Understanding Derivation Paths for Investigators 435
Avoiding Oversight and Ensuring Legal Admissibility 436
The Concept of a Derivation Path 436
Bitcoin vs Ethereum Derivation Paths 437
Changing Derivation Paths in Software Wallets 438
To Sum Up 444
17 Crypto Seizure 445
What Do You Need to Carry Out a Crypto Seizure? 463
Recording Seed Words 466
Seizing to Your Own Wallet 467
Considerations for a Software Wallet 467
Considerations for a Hardware Wallet 468
Establishing an Organizational Process 469
Document Your Processes 469
Methods of Recording 470
Paperwork 470
Video 470
Preparation and Administration 471
Documentation in Law Enforcement Systems 471
Questions to Ask before Carrying Out a Crypto Seizure 471
Preparing for a Time-Sensitive Seizure 472
On-Site Seizure Considerations 472
Managing Access and Potential Threats 472
On-Site Toolkit and Practice 473
Where to Store Seized Assets? 473
Seizing to an Exchange 473
Specialist Custodians 474
Seizing to a Law Enforcement-Controlled Wallet 475
Final Thoughts 477
Acknowledgments 483
About the Author 485
About the Contributors 487
About the Technical Editor 493
Index 495
Driving the Harbor Freeway north out of Los Angeles toward Pasadena, you pass by the densely populated residential areas of South Park and Vermont Harbor before likely noticing the huge sporting complex that includes the LA Memorial Coliseum and the Bank of California Stadium on your left. As you pass under the Santa Monica Freeway and swing to the northeast, the vast LA Convention Center comes into view and behind it the famous home of the LA Lakers basketball team. This arena had for decades been known as the Staples Center, named after its sponsor, the vast multinational office supplies organization. However, a person driving past around Christmas 2021 would have noticed the familiar Staples signs were gone and had been replaced by a name written in blue and white. Crypto.com Arena.
For many, this would have been the first time they had seen or heard of the name of one of the largest cryptocurrency exchanges in the world. Although just five years old when they took over sponsorship of the Lakers home, the Singapore-based company had tens of millions of customers around the world and represented just one of the many cryptocurrency exchanges dealing billions of dollars of virtual currencies every day.
A few months later, during the 2022 Super Bowl, arguably one of the most expensive sporting events in the world for a company to advertise their services, five cryptocurrency exchanges ran TV advertisements or social media campaigns to coincide with it. Crypto.com has gone on to become a sponsor of the FIFA World Cup, and Formula 1 cars in 2022 displayed the logos of Binance, Bybit, Tezos, FTX, and other cryptocurrency brands. Cryptocurrencies were now squarely in the public consciousness.
At a governmental level, having long ignored or simply criticized digital currencies, countries started to wake up to the fact that these new currencies were here to stay. Although much of their early use was arguably by a mix of hobbyists, conspiracists waiting for the new world order, and criminals, now middle-class people living in the suburbs were beginning to take an interest and buy into this new investment opportunity. Newspapers and social media were running stories of the vast profits to be made, and many with some spare cash wanted in, arguably driven by a new acronym, FOMO, or fear of missing out. Anecdotal accounts of people remortgaging property to buy Bitcoin appeared in the more sensationalist press, and futures contracts and shorting options began to be made available, often by brand-new, unregulated companies.
Legislation was badly needed, and suddenly governments became more aware of the issue and started to respond. First, bodies such as the Financial Crimes Enforcement Network (FinCEN), a bureau of the U.S. Department of the Treasury, and the Financial Conduct Authority in the UK began to react to the complex issues of companies trading cryptocurrencies. Second, the tax authorities started to consider the difficulties of tracking and charging tax on the highly volatile and anonymous nature of crypto assets. Lastly, central government caught up, and by 2022, President Biden had signed an executive order (Executive Order on Ensuring Responsible Development of Digital Assets-March 9, 2022), and legislation for the "regulation of stablecoins and cryptoassets" appeared in the British Queen's Speech (https://lordslibrary.parliament.uk/queens-speech-2022-economic-affairs-and-business).
https://lordslibrary.parliament.uk/queens-speech-2022-economic-affairs-and-business
Other countries responded in a rather more binary way by either banning cryptocurrencies, as did China and Indonesia, or conversely welcoming them, including El Salvador, who made Bitcoin legal tender in 2021, followed by the Central African Republic.
It is notable that it is generally countries that are experiencing difficulties with their primary fiat currency that are reacting in these more contrasting ways to cryptocurrencies.
NOTE Fiat money is a government-issued currency that is not backed by a physical commodity, such as gold or silver, but rather by the government that issued it.
As mentioned earlier, El Salvador reacted to financial pressures by welcoming Bitcoin. Turkey, in the midst of crippling inflation (mid-2022) of the Turkish lira, banned the use of Bitcoin for paying for goods and services. People were turning to cryptocurrencies as a "stable" alternative to the lira, which is extraordinary when you consider how volatile the Bitcoin price can be. Governments will continue to struggle with this new challenge to their traditional centralized, government-controlled currencies for some time to come.
As I stated previously, arguably, cryptocurrencies are part of the public's consciousness in many countries around the globe, but why is this of interest to criminal investigators? To answer this question, we need to briefly look at the history of cryptocurrencies, which will help us understand their appeal to criminality.
English words have an odd way of changing their meaning. In the 13th century the word "silly" was someone pious or religious; however, by the late 1800s the word carried the meaning we have today of someone or something being foolish. "Crypto" has become one of those words that used to mean one thing but is now generally recognized as referring to something else. If just two or three years ago, you had asked any technologist what the word "crypto" referred to, they likely would have all responded that it was a shortened form of the word "cryptography." Cryptography has to do with the securing of data either in transit or at rest through, historically, the use of codes and ciphers, and in recent times something we will explain in more detail later known as public/private key cryptography. But as I'm penning this chapter, if you ask either a technologist or just a person on the street what "crypto" is, they will probably say Bitcoin, Ethereum, or cryptocurrencies, or something similar. Why has this change to the generally accepted meaning of the word happened? Certainly, in the English language we do love to shorten words (my actual name is Nicholas but the only person who ever called me that was my mum when I was misbehaving!) and crypto is much easier to say, and definitely easier to type, than cryptocurrency.
The reality is that the two meanings are closely linked. The crypto part of the word "cryptocurrency" comes from the fact that all cryptocurrencies have their transactions and transaction ledgers confirmed and protected by cryptography. In the case of Bitcoin and its derivatives, it uses a quite simple form of cryptography and it's very secure but fundamentally straightforward. It's a mistake to read online about all the hack attacks and losses of digital currencies like Bitcoin and think that there is something wrong with the code or the cryptography underpinning it. Bitcoin has never suffered from a successful attack against its source code or crypto. We will discuss in more detail how attacks against users and custodians of cryptocurrencies can fall prey to criminals in Chapter 2, "Understanding the Criminal Opportunities: Money Laundering," and Chapter 3, "Understanding the Criminal Opportunities: Theft."
Although you do not need to become a cryptographic scientist to understand how these systems work, it is still useful for an investigator to have a good idea of how cryptocurrencies are protected in order to better grasp some of the attacks against them. We will discuss this in more detail in several of the early chapters.
From a criminal perspective, cryptocurrencies offer opportunities that are difficult to achieve through the traditional banking network. We shouldn't believe that crypto is anonymous-every transaction is recorded on the blockchain ledger for anyone to study. The issue for the investigator comes from the fact that it is difficult to connect a cryptocurrency address to a user. This pseudo-anonymity provides opportunities to hide movements of assets, pay for or receive payments for illicit goods, or target others' crypto assets, in an environment that is challenging for the investigator to analyze. As this book will outline, difficult does not mean impossible.
Although this chapter is called "A History of Cryptocurrencies and Crime," I wrote a deeper background of crypto assets in my book Investigating Cryptocurrencies (Wiley, 2018) and I won't go into as much detail here. However, I think it's worth the investigator being aware of the accepted stepping-stones of crypto up to the present day and how they relate to the changing shape of crimes that utilize cryptocurrencies.
Most articles and books written on the history of cryptocurrencies point back to a cryptographer named David Chaum, who created an early form of electronic money called DigiCash in 1989. Others believe that the 1998 Bit Gold concept by Nick Szabo was closer to our concept of a cryptocurrency, where a predecessor of the concept of "mining" by solving algorithmic problems was implemented. Interestingly, Nick also wrote a white paper in 1994 in which he described in significant detail the concept of a digital, or smart, contract, which was an agreement between parties based purely on a coded contract with no third parties involved.
But it's the white paper published in October 2008 by the enigmatic Satoshi...
Dateiformat: ePUBKopierschutz: Adobe-DRM (Digital Rights Management)
Systemvoraussetzungen:
Das Dateiformat ePUB ist sehr gut für Romane und Sachbücher geeignet – also für „fließenden” Text ohne komplexes Layout. Bei E-Readern oder Smartphones passt sich der Zeilen- und Seitenumbruch automatisch den kleinen Displays an. Mit Adobe-DRM wird hier ein „harter” Kopierschutz verwendet. Wenn die notwendigen Voraussetzungen nicht vorliegen, können Sie das E-Book leider nicht öffnen. Daher müssen Sie bereits vor dem Download Ihre Lese-Hardware vorbereiten.Bitte beachten Sie: Wir empfehlen Ihnen unbedingt nach Installation der Lese-Software diese mit Ihrer persönlichen Adobe-ID zu autorisieren!
Weitere Informationen finden Sie in unserer E-Book Hilfe.