Details

There's No Such Thing as Crypto Crime


There's No Such Thing as Crypto Crime

An Investigative Handbook
1. Aufl.

von: Nick Furneaux

22,99 €

Verlag: Wiley
Format: EPUB
Veröffentl.: 30.10.2024
ISBN/EAN: 9781394164837
Sprache: englisch
Anzahl Seiten: 528

DRM-geschütztes eBook, Sie benötigen z.B. Adobe Digital Editions und eine Adobe ID zum Lesen.

Beschreibungen

<p><b>Hands-on guidance for professionals investigating crimes that include cryptocurrency</b></p> <p>In <i>There’s No Such Thing as Crypto Crime: An Investigators Guide</i>, accomplished cybersecurity and forensics consultant Nick Furneaux delivers an expert discussion of the key methods used by cryptocurrency investigators, including investigations on Bitcoin and Ethereum type blockchains. The book explores the criminal opportunities available to malicious actors in the crypto universe, as well as the investigative principles common to this realm.</p> <p>The author explains in detail a variety of essential topics, including how cryptocurrency is used in crime, exploiting wallets, and investigative methodologies for the primary chains, as well as digging into important areas such as tracing through contracts, coin-swaps, layer 2 chains and bridges. He also provides engaging and informative presentations of:</p> <ul> <li>Strategies used by investigators around the world to seize the fruits of crypto-related crime</li> <li>How non-fungible tokens, new alt-currency tokens, and decentralized finance factor into cryptocurrency crime</li> <li>The application of common investigative principles—like discovery—to the world of cryptocurrency</li> </ul> <p>An essential and effective playbook for combating crypto-related financial crime, <i>There’s No Such Thing as Crypto Crime</i> will earn a place in the libraries of financial investigators, fraud and forensics professionals, and cybercrime specialists.</p>
<p>Foreword xiii</p> <p>Introduction xvii</p> <p><b>1 A History of Cryptocurrencies and Crime 1</b></p> <p>Where Did It All Start? 3</p> <p>The Rise of the Smart Contract 7</p> <p>The Next Targets? 14</p> <p>The Future? More Crime! 16</p> <p><b>2 Understanding the Criminal Opportunities: Money Laundering 19</b></p> <p>There Is No Such Thing as Crypto Crime 36</p> <p>Money Laundering 40</p> <p>What Is an Investigator Looking For? 42</p> <p>Centralized Exchanges 43</p> <p>NFTs and NFT Gaming 45</p> <p>Mixers 48</p> <p>Decentralized Exchanges 53</p> <p>Casinos. 56</p> <p>Chain Hopping 57</p> <p>Privacy Coins 59</p> <p>Crypto ATMs 62</p> <p>Peer-to-Peer Platforms 64</p> <p><b>3 Understanding the Criminal Opportunities: Theft 67</b></p> <p>Crypto Thefts 67</p> <p>Social Engineering 67</p> <p>Phishing 68</p> <p>Hacks 71</p> <p>Fraud 73</p> <p>Rug Pull 74</p> <p>Pig-Butchering/Romance Scams 76</p> <p>Investment Scams 79</p> <p>Support Scams 83</p> <p>Simple Theft 84</p> <p>Contract Manipulation 86</p> <p>Fake Contracts 86</p> <p>Exploiting the Contract 87</p> <p>Phishing 89</p> <p>Flash Loans 90</p> <p>Playing by the Rules 92</p> <p>Other Criminal Opportunities 96</p> <p>Yield Farming 96</p> <p>Funding of Groups 97</p> <p>Sanctions Avoidance 99</p> <p>Summary 108</p> <p><b>4 Who Should Be a Cryptocurrency Investigator? 109</b></p> <p>Individual Skills 111</p> <p>Knowledge of Technological Systems 111</p> <p>Knowledge of Digital Currencies 112</p> <p>Understanding of the Cryptocurrency Market 112</p> <p>Extensive Knowledge of Computer Networks 113</p> <p>Cryptography 114</p> <p>Financial Crime 114</p> <p>Fraud Investigators 114</p> <p>Open Source Investigations 115</p> <p>Cybercrime Investigations 116</p> <p>Setting Up a Cryptocurrency Investigation Department 117</p> <p>Other Roles. 123</p> <p><b>5 The Role of Commercial Investigation Tools 125</b></p> <p>Do You Need a Commercial Tool? 129</p> <p>Two Is One and One Is None 133</p> <p>The Future of Investigation Tools 135</p> <p><b>6 Mining: The Key to Cryptocurrencies 139</b></p> <p>What Really Is Mining? 141</p> <p>Validating Transactions 141</p> <p>Minting New Coins 142</p> <p>Proof of Work (PoW) Mining 142</p> <p>How PoW Mining Works 142</p> <p>Energy Consumption and Environmental Concerns 145</p> <p>Proof of Stake (PoS) Mining 146</p> <p>How PoS Mining Works 146</p> <p>Advantages of PoS Mining 146</p> <p>Does an Investigator Need to Understand Mining Technologies? 146</p> <p>Cryptocurrency Mining Frauds and Scams 147</p> <p>Cloud Mining Scams 147</p> <p>Ponzi and Pyramid Schemes 148</p> <p>Malware and Cryptojacking 149</p> <p>Asset Discovery 149</p> <p>Will Cryptocurrencies Always Be Mined? 150</p> <p><b>7 Cryptocurrency Wallets 153</b></p> <p>When a Wallet Is Not Really a Wallet 155</p> <p>Types of Cryptocurrency Wallets 156</p> <p>Hot Wallets 157</p> <p>Desktop Wallets. 157</p> <p>Mobile Wallets 158</p> <p>Web/Online Wallets 158</p> <p>Cold Wallets 160</p> <p>Hardware Wallets 160</p> <p>Paper Wallets 161</p> <p>Software Wallets: Functionality and Security 162</p> <p>Functionality 163</p> <p>Security 163</p> <p>Hardware Wallets: Functionality and Security 164</p> <p>Functionality 164</p> <p>Security 164</p> <p>Choosing the Right Wallet 165</p> <p>Wallet Vulnerabilities 166</p> <p>Weak or Reused Passwords 166</p> <p>Phishing Attacks 166</p> <p>Malware 167</p> <p>On-Path Attacks 167</p> <p>Vulnerable Wallet Software 168</p> <p>Lack of Two-Factor Authentication (2FA) 168</p> <p>Social Engineering 169</p> <p>SIM-Swapping Attacks 169</p> <p>Supply Chain Attacks 170</p> <p><b>8 The Importance of Discovery 173</b></p> <p>Premises Searching: Legal Framework and Search Powers 176</p> <p>Search Strategies 177</p> <p>Handling and Securing Evidence 177</p> <p>Evidence Bags 178</p> <p>Body Cameras 179</p> <p>Photography 179</p> <p>Chain of Custody 180</p> <p>Physical Clues. 181</p> <p>Hardware Wallets 181</p> <p>Paper Wallets 183</p> <p>QR Codes 186</p> <p>Documentation 186</p> <p>Questioning 188</p> <p>General Understanding 188</p> <p>Involvement and Knowledge of Cryptocurrencies 188</p> <p>Specific Details of the Alleged Crime 189</p> <p>Technical Details 189</p> <p>Searching Digital Assets 190</p> <p>Legal Framework and Warrants 192</p> <p>Digital Forensics 194</p> <p>Hardware Examination 198</p> <p>Storage Devices 198</p> <p>RAM Analysis 200</p> <p>What are you looking for? 202</p> <p>Handling and Securing Digital Evidence 204</p> <p>The Role of Exchanges 204</p> <p>Senior Officers/Management 206</p> <p>Summary 206</p> <p><b>9 The Workings of Bitcoin and Derivatives 209</b></p> <p>Bitcoin Is a Blockchain-Based UTXO Cryptocurrency 210</p> <p>UTXO 211</p> <p>What Does an Transaction Look Like? 215</p> <p>How Does a UTXO Blockchain Help an Investigator? 220</p> <p>Blockchain Explorers 222</p> <p>What Else Can You Learn in a Transaction? 226</p> <p>Times and Dates 227</p> <p>Values 229</p> <p>Omni Layer 231</p> <p>Taproot 232</p> <p>The Lightning Network 235</p> <p>Summary 237</p> <p><b>10 Bitcoin: Investigation Methodology 239</b></p> <p>Building an Investigation in Bitcoin 251</p> <p>Address Clustering 253</p> <p>How Are Clusters Defined? 255</p> <p>Co-spend Heuristic 255</p> <p>Change Analysis 256</p> <p>Nominal Spend 257</p> <p>Address Type Analysis 259</p> <p>Multisig Analysis 260</p> <p>Round Number Payments 261</p> <p>Some Other Things to Note 262</p> <p>Change of Ownership 263</p> <p>Change of Wallet 263</p> <p>Look at the Amounts 263</p> <p>Address Triage 265</p> <p>Attribution 271</p> <p>Investigating Bitcoin 271</p> <p><b>11 The Workings of Ethereum and Derivatives 273</b></p> <p>History of the Ethereum Cryptocurrency 274</p> <p>Ethereum Fundamentals 276</p> <p>Types of Tokens 279</p> <p>Ethereum Transaction Types 282</p> <p>One Address for All Tokens 286</p> <p>A User’s Address Can Be the Same on Other Blockchains 288</p> <p>Reading Basic Transactions 290</p> <p>Transaction Methods 291</p> <p>Transaction and Address Types 293</p> <p>What Are These Contracts We Keep Mentioning? 294</p> <p>Identifying Contract Transactions 295</p> <p>Conclusion 296</p> <p><b>12 Ethereum: Investigation Methodology 297</b></p> <p>Following ETH-to-ETH Transactions 297</p> <p>Smart Contracts Deep Dive 304</p> <p>Methods, Functions, and Events 307</p> <p>Code 309</p> <p>Read Contract 310</p> <p>Write Contract. 310</p> <p>Logs 314</p> <p>ETH-to-Contract Transactions 316</p> <p>Token-to-Token Transactions 324</p> <p>NFTs 329</p> <p>Decentralized Exchanges 335</p> <p>Reading Decentralized Finance Contracts 342</p> <p>The Approve Transaction 351</p> <p>Summary 353</p> <p><b>13 Investigating Binance Smart Chain 355</b></p> <p>What is Binance Smart Chain? 355</p> <p>Investigating Funds on Binance Smart Chain 357</p> <p>What Have You Learned? 364</p> <p><b>14 Applying What You Have Learned to New Cryptocurrencies 367</b></p> <p>Stable Coins Such as USDT, USDC, and Paxos 368</p> <p>Tron 372</p> <p>Tron Fee Structure 372</p> <p>What Transactions Look Like 372</p> <p>Layer 2 Chains 377</p> <p>Bridges 383</p> <p>Mixers 388</p> <p>Bitcoin Mixing 389</p> <p>Ethereum Mixing 393</p> <p>Privacy Coins 395</p> <p>Monero (XMR): The Vanguard of Privacy Coins 396</p> <p>Zcash (ZEC): Selective Transparency 396</p> <p>Dash (DASH): Privacy as an Option 397</p> <p>Horizen (ZEN): Extended Privacy with Sidechains 397</p> <p>Grin and Beam: Mimblewimble Protocol 398</p> <p>What Have You Learned? 398</p> <p><b>15 Open Source Intelligence and the Blockchain 401</b></p> <p>Mindset 402</p> <p>Just “Search Engine” It 404</p> <p>Attribution of Individuals 412</p> <p>NFT Metadata 421</p> <p>OSINT and the Dark Web 423</p> <p>Summary 425</p> <p><b>16 Using Wallets for Investigations 427</b></p> <p>Understanding Cryptocurrency Wallets 427</p> <p>Seed Words and Wallet Recovery 428</p> <p>Step-by-Step Guide to HD Wallet Re-creation 428</p> <p>What Can Be Seen? 429</p> <p>The Benefits of Wallet Re-creation in Investigations 434</p> <p>Understanding Derivation Paths in Cryptocurrency Wallets 435</p> <p>The Importance of Understanding Derivation Paths for Investigators 435</p> <p>Avoiding Oversight and Ensuring Legal Admissibility 436</p> <p>The Concept of a Derivation Path 436</p> <p>Bitcoin vs Ethereum Derivation Paths 437</p> <p>Changing Derivation Paths in Software Wallets 438</p> <p>To Sum Up 444</p> <p><b>17 Crypto Seizure 445</b></p> <p>What Do You Need to Carry Out a Crypto Seizure? 463</p> <p>Recording Seed Words 466</p> <p>Seizing to Your Own Wallet 467</p> <p>Considerations for a Software Wallet 467</p> <p>Considerations for a Hardware Wallet 468</p> <p>Establishing an Organizational Process 469</p> <p>Document Your Processes 469</p> <p>Methods of Recording 470</p> <p>Paperwork 470</p> <p>Video 470</p> <p>Preparation and Administration 471</p> <p>Documentation in Law Enforcement Systems 471</p> <p>Questions to Ask before Carrying Out a Crypto Seizure 471</p> <p>Preparing for a Time-Sensitive Seizure 472</p> <p>On-Site Seizure Considerations 472</p> <p>Managing Access and Potential Threats 472</p> <p>On-Site Toolkit and Practice 473</p> <p>Where to Store Seized Assets? 473</p> <p>Seizing to an Exchange 473</p> <p>Specialist Custodians 474</p> <p>Seizing to a Law Enforcement–Controlled Wallet 475</p> <p>Final Thoughts 477</p> <p>Acknowledgments 483</p> <p>About the Author 485</p> <p>About the Contributors 487</p> <p>About the Technical Editor 493</p> <p>Index 495</p>
<p><b>NICK FURNEAUX</b> is a cybersecurity and forensics consultant specializing in the prevention and investigation of cybercrime. Nick is author of the 2018 book <i>Investigating Cryptocurrencies</i> and has trained thousands of investigators in the skills needed to track cryptocurrency used in crimes. He works within the training academy at TRM Labs, and is an advisor to the Board of Asset Reality.
<p><B>A PLAYBOOK FOR FOLLOWING THE DIGITAL MONEY TRAIL AND SOLVING CRIMES INVOLVING CRYPTO</B> <p>From high profile cases and media reporting, we know that crimes involving cryptocurrency are on the rise—to the tune of tens of billions of dollars per year. So is this a new type of crime? <i>There’s No Such Thing as Crypto Crime: An Investigative Handbook </i>will show you that fraud or theft involving cryptocurrency is substantially the same as fraud or theft of any other financial asset. That’s good news for investigators—it means we already have the tools and tactics we need to solve these crimes and stop crypto criminals in their tracks. This book shows you how to apply the principles of financial forensic investigation to the world of digital currency. <p>Inside, leading cybersecurity and forensics consultant Nick Furneaux, assisted by some of the worlds experts in crypto oriented crime, lays it all out: the technology behind cryptocurrency, the most common types of crime and exploitation, various investigative strategies, and methods for seizing illicitly held assets. From the primary cryptocurrencies of Bitcoin and Ethereum to key alt coins such as Tron and Binance Smart Chain, you’ll learn how to follow the trail of blockchain transactions and combat crypto related financial crime. <p>This is a book that should be read by everyone involved in financially motivated crimes including criminal and tax investigators, lawyers, legislators and more.

Diese Produkte könnten Sie auch interessieren:

Machine Learning and Metaheuristic Computation
Machine Learning and Metaheuristic Computation
von: Erik Cuevas, Jorge Galvez, Omar Avalos, Fernando Wario
PDF ebook
115,99 €
There's No Such Thing as Crypto Crime
There's No Such Thing as Crypto Crime
von: Nick Furneaux
PDF ebook
22,99 €