Bit Coin
Bit Coin
Ref # 8091-4ee9-ae43-3d3759fc46fb
2018-46528652
E
verybody’s heard about Bitcoin by now. How the value of this new
virtual currency wildly swings with the latest industry news or even
rumors. Criminals use Bitcoin for money laundering and other
nefarious activities because they think it can’t be traced and can be used with
anonymity. How speculators are making millions dealing in this trend or fad
that seems more like fanciful digital technology than real paper money or
currency. Some critics call Bitcoin a scam in and of itself, a new high-tech
vehicle for bilking the masses.
But what are the facts? What exactly is Bitcoin and how is it regulated? How
can criminal investigators track its usage and use transactions as evidence of
money laundering or other financial crimes? Is Bitcoin itself fraudulent?
Ref # 8091-4ee9-ae43-3d3759fc46fb
2018-46528652
Bitcoin Basics
2
Ref # 8091-4ee9-ae43-3d3759fc46fb
2018-46528652
Bitcoin Basics
Irreversible:
After confirmation, a transaction can not be reversed. By nobody. And nobody means
nobody. Not you, not your bank, not the president of the United States, not Satoshi,
not your miner. Nobody. If you send money, you send it. Period. No one can help you,
if you sent your funds to a scammer or if a hacker stole them from your computer.
There is no safety net.
Pseudonymous:
Neither transactions nor accounts are connected to real-world identities. You receive
Bitcoins on so-called addresses, which are seemingly random chains of around
30 characters. While it is usually possible to analyze the transaction flow, it is not
necessarily possible to connect the real world identity of users with those addresses.
Secure:
Cryptocurrency funds are locked in a public key cryptography system. Only the owner
of the private key can send cryptocurrency. Strong cryptography and the magic of big
numbers makes it impossible to break this scheme. A Bitcoin address is more secure
than Fort Knox.
Permissionless:
You don‘t have to ask anybody to use cryptocurrency. It is software that everybody
can download for free. After you installed it, you can receive and send Bitcoins or
other cryptocurrencies. No one can prevent you. There is no gatekeeper.
The stages of a typical BItcoin transaction are depicted on the chart on the following
page. Some basic knowledge of computer science is necessary to understand the
process. The technology used by Bitcoin and the blockchain cannot be sufficiantly
covered in this publication. There are many technical manuals and online resources
that delve into the underlying technology.
3
Ref # 8091-4ee9-ae43-3d3759fc46fb
2018-46528652
T h e
root 486c 6be4 6dde...
T h e
root b8db 7ee9 8392...
Ref # 8091-4ee9-ae43-3d3759fc46fb
2018-46528652
Ref # 8091-4ee9-ae43-3d3759fc46fb
2018-46528652
Bitcoin Basics
Alternative Cryptocurrencies
6
Ref # 8091-4ee9-ae43-3d3759fc46fb
2018-46528652
Bitcoin Basics
Alternative Cryptocurrencies
applications on Ethereum are run on its platform- 5) Ripple (XRP)
specific cryptographic token, ether. Ether is like Ripple is a real-time global settlement network that
a vehicle for moving around on the Ethereum offers instant, certain and low-cost international
platform, and is sought by mostly developers looking payments. Ripple “enables banks to settle cross-
to develop and run applications inside Ethereum. border payments in real time, with end-to-end
According to Ethereum, it can be used to “codify, transparency, and at lower costs.” Released in 2012,
decentralize, secure and trade just about anything.” Ripple currency has a market capitalization of $1.26
Following the attack on the DAO in 2016, Ethereum billion. Ripple’s consensus ledger — its method of
was split into Ethereum (ETH) and Ethereum Classic conformation — doesn’t need mining, a feature that
(ETC). Ethereum (ETH) has a market capitalization deviates from Bitcoin and altcoins. Since Ripple’s
of $41.4 billion, second after Bitcoin among all structure doesn’t require mining, it reduces the usage
cryptocurrencies. of computing power, and minimizes network latency.
Ripple believes that “distributing value is a powerful
3) Zcash (ZEC) way to incentivize certain behaviors” and thus
Zcash, a decentralized and open-source currently plans to distribute XRP primarily “through
cryptocurrency launched in the latter part of business development deals, incentives to liquidity
2016, looks promising. “If Bitcoin is like http for providers who offer tighter spreads for payments,
money, Zcash is https,” is how Zcash defines itself. and selling XRP to institutional buyers interested in
Zcash offers privacy and selective transparency of investing in XRP.”
transactions. Zcash claims to provide extra security
or privacy where all transactions are recorded and 6) Monero (XMR)
published on a blockchain, but details such as the Monero is a secure, private and untraceable currency.
sender, recipient, and amount remain private. Zcash This open-source cryptocurrency was launched in
offers its users the choice of shielded transactions, April 2014 and soon spiked great interest among
which allow for content to be encrypted using the cryptography community and enthusiasts. The
advanced cryptographic technique or zero-knowledge development of this cryptocurrency is completely
proof construction called a zk-SNARK developed by donation-based and community-driven. Monero has
its team. been launched with a strong focus on decentralization
and scalability, and enables complete privacy by using
4) Dash (DASH) a special technique called ring signatures. With this
Dash (originally known as Darkcoin) is a more technique, there appears a group of cryptographic
secretive version of Bitcoin. Dash offers more signatures including at least one real participant — but
anonymity as it works on a decentralized mastercode since they all appear valid, the real one cannot be
network that makes transactions almost untraceable. isolated.
Launched in January 2014, Dash experienced an
increasing fan following in a short span of time. This 7) Bitcoin Cash (BCH)
cryptocurrency was created and developed by Evan Bitcoin Cash has the exact same transaction history
Duffield and can be mined using a CPU or GPU. In as the original Bitcoin, up to Aug. 1, 2017. Its primary
March 2015, Darkcoin was rebranded to Dash, which difference is that it is designed to allow more
stands for Digital Cash and operates under the ticker transactions to pass through, on a per-second basis,
– DASH. The rebranding didn’t change any of its than Bitcoin, which leads to lower user fees. It was
technological features such as Darksend, InstantX. developed by a group of developers and businesses
who weren’t satisfied with the existing configuration
of Bitcoin.
7
Ref # 8091-4ee9-ae43-3d3759fc46fb
2018-46528652
Bitcoin Basics
8
Ref # 8091-4ee9-ae43-3d3759fc46fb
2018-46528652
Bitcoin Basics
9
Ref # 8091-4ee9-ae43-3d3759fc46fb
2018-46528652
Bitcoin Basics
• Standard operating procedures for handling Since anyone with the private key of an address has
and preserving digital evidence complete control over funds in that address, this gives
• Chain-of-custody instructions for devices Bitcoin a certain level of flexibility and control not
containing digital evidence otherwise found in fiat (“cash”) currency. There could
be multiple copies of the private key stored in multiple
It is highly recommended that your department locations, or different people could have it. There is no
set up an all-encompassing crypto-currency central bank or system to freeze funds.
policy. Set up a department-controlled wallet
on a secure machine and establish rules When seizing Bitcoin, it is essential to move the Bitcoin
surrounding the process of seizing and storing to a wallet you control, or they could be sent anywhere
Bitcoin. The address of the wallet should be in the world in minutes, even if you have the suspect in
easily accessible to allow the swift seizing of custody and their device secured.
Bitcoin if it is encountered during the course of
an investigation, due to its fungible and unique Since a wallet is simply a way of storing, managing,
nature. Seizing a suspect and their computer and securing your private keys that allow you to sign
does not mean seizing the Bitcoin; anyone in a transaction, different types of wallets offer different
the world that the suspect trusted with their levels of ease-of-use and security. Wallets can exist in
Bitcoin could move it in seconds. It is imperative many different forms. The most commonly used is a
to move the funds to an address that you control
the private key to. Source: Bitcoin Investigative Field Guide, by
Refer to your local prosecutor or legal counsel the National White Collar Crime Center,
for any details or steps taken after the funds accessible online at https://www.nw3c.
have been seized. org/Resources/Bitcoin-investigative-field-
guide/content/index.html#/?_k=kjt5dz
10
Ref # 8091-4ee9-ae43-3d3759fc46fb
2018-46528652
Bitcoin Basics
software wallet, which is a program that runs on your Almost every type of wallet uses a file with this naming
computer or mobile device. There are also web-based convention, and a file like that existing on a computer
wallets that you log into with an email or username is indicative of Bitcoin being in play.
and password.
A relatively new type of wallet, online wallets exist
The Cyber Crime Unit at the National White Collar on a user’s Android or iOS smartphone. This type of
Crime Center recommends the use of the Coinbase wallet is generally very simple and features a basic and
online wallet. Coinbase operates as a US-based intuitive interface designed for the average end-user
exchange and is the only large Bitcoin service to who is just getting into Bitcoin. They can be identified
have never suffered a security breach compromising by a logo or icon on the home screen of a smartphone.
customer or user information or funds. They are law They are occasionally secured by an additional PIN
enforcement-friendly and are willing to work with law or password with a lock-out feature if failed too many
enforcement to track funds, freeze user accounts, and times. The most common wallets for mobile devices
otherwise assist in investigations however they can. are Mycelium, Greenbits, breadwallet, and Airbitz.
They are an industry leader and are the largest US-
based exchange. Online wallets typically function as an extension of
the exchange on which they were purchased. They
Creating an account for their service involves identity are accessed through a website and require log-in
verification, due to Know Your Customer laws. After information, and typically require a form of two-factor
successfully completing registration, you can log in and authentication as additional security.
view your Bitcoin wallet with the Accounts tab at the
top of the screen. Click “Receive” next to the Bitcoin The most popular exchanges and online wallet services
wallet, and you will be prompted with a QR code to are Coinbase, GDAX, Gemini, and Kraken. Many
scan, if you have seized a mobile device storing Bitcoin, of these also serve as trading platforms, similar to a
and a text string if it is a software or online wallet. stock exchange. The 4 listed above all require proof
Simply copy and paste the string into the input field in of identity, due to Know Your Customer laws, and
whatever wallet you’re seizing funds from and dump operate out of the United States. Coinbase and GDAX
the balance to secure the funds. You then have the have been known to cooperate with law enforcement
choice of converting the seized Bitcoin to USD through investigations in the past, surrendering customer
your Coinbase wallet, to preserve the monetary value, information and purchase patterns.
or leaving it as-is to preserve the property and potential
chain-of-custody. Cold storage wallets can be more difficult to identify,
as they are simply a website that was visited and
The most common way of storing and securing Bitcoin used. The best way to identify these are through the
is the computer wallet, which runs as an application suspect’s browser history. Searching for “bit”, “coin”,
on your computer. They are generally very easy to use, or any of the four exchanges above will cover almost
with clear indicators on-screen of how to transfer funds every commonly used exchange. If any of the other
out. The most common computer wallets are Electrum, three types of wallets are found during the course of an
Armory, Bitcoin Core, and MultiBit-HD. These will investigation, it is almost guaranteed that the suspect
typically be identified as an icon on the user’s desktop. used an online wallet at some point to either buy or sell
You can also use the Search function on the computer their Bitcoin for US dollars, and it is worth looking into
to look for any file with the word “wallet” in the file which exchange they used and attempting to obtain
name, or a .dat file extension. additional information about them from the exchange.
11
Ref # 8091-4ee9-ae43-3d3759fc46fb
2018-46528652
Bitcoin Basics
*Investigative Note: Contact the online wallet service credentials for accessing the department Bitcoin wallet.
for assistance in freezing an account to prevent If there is no existing department Bitcoin wallet, DO
additional transactions. NOT use a personal Bitcoin wallet.
Without a Bitcoin wallet, you cannot continue
Cold storage is an alternative way of storing Bitcoin, through the collection process. Please proceed to the
and by far the most secure. Since you need the private “Preservation” section on page 14.
key to send Bitcoin, cold storage revolves around the
idea of never exposing the private key to the Internet. Step 3
This may mean writing it down on a piece of paper, If you can access the suspect’s Bitcoin wallet:
storing it on a USB stick, or memorizing it. This type To transfer a suspect’s Bitcoin to a department Bitcoin
of wallet is much harder to identify, as it could be wallet, you must have access to the private keys within
anything. If there is evidence of Bitcoin being in play, his/her Bitcoin wallet.
such as recently used Bitcoin exchanges, empty Bitcoin Getting the suspect to volunteer the encryption code
wallets, or recently visited websites explaining Bitcoin, is the easiest method of access. If the suspect will not
it is possible that a cold storage wallet is being used. volunteer the encryption code, simply getting the
suspect to admit he knows the encryption code is
Look for labeled USB drives, pieces of paper with 12 to helpful in obtaining an order to compel the suspect to
24 random English words (a recovery seed), or a long unlock the wallet.
string of what appears to be gibberish or encrypted If you cannot access the suspect’s Bitcoin wallet:
information. The information on the USB drive, the The device on which the encrypted wallet exists should
recovery seed, or the string of gibberish can all be be seized in compliance with department procedures
imported into Coinbase to directly seize the funds for seizing any other encrypted device. Officers should
without any technical knowledge needed. document the scene, keep the device powered, and
call the department’s IT specialist as soon as possible.
Bitcoin should be collected as soon as possible once Proceed to “Preservation” on page 14.
it has been determined that seizure is appropriate.
Because there is a risk that a co-conspirator might Step 4
drain a suspect’s Bitcoin, time is of the essence. Depending on the type of Bitcoin wallet encountered,
follow the below process.
How to seize Bitcoin protected by encryption
Mobile wallets: If the suspect is using a mobile wallet,
Step 1 the process for making a transfer is relatively simple.
As in all cases involving evidence, responding personnel In the suspect’s wallet, navigate to the transfer or send
should thoroughly document the scene. tab. Enter the department wallet’s address or scan its
When a Bitcoin wallet is discovered, access to it is often QR code in the space labeled recipient. Enter the full
protected by encryption. value of the wallet as the amount to be transferred.
In the event the suspect’s computer or mobile device Then press transfer or send to move the funds to the
is unlocked, follow best practices for maintaining the department wallet.
current state of the device to prevent it from locking
from inactivity. Software wallets: Generally, funds can be obtained
from a software wallet using the same method as a
Step 2 mobile wallet. However, with a software wallet, the
Ensure you (or authorized person) have access to your suspect’s private keys may be available either within
department’s Bitcoin wallet. You will need to know the the wallet or stored elsewhere on the device. Access
12
Ref # 8091-4ee9-ae43-3d3759fc46fb
2018-46528652
Bitcoin Basics
to a suspect’s private keys gives indefinite access to the When a Bitcoin wallet is discovered not protected by
accounts associated with those keys. While it is not encryption, you have complete access to all available
recommended that the officer attempt to access the Bitcoins.
private keys, it is important that the device is treated as In the event the suspect’s computer or mobile device
an encrypted device and seized, even if the officer can is unlocked, follow best practices for maintaining the
transfer the Bitcoin. current state of the device to prevent it from locking
from inactivity.
Online wallets: If a suspect is using an online wallet,
police can use the above method to transfer funds. Step 2
Because online wallets use a third party to store Bitcoin Ensure you (or authorized person) have access to your
funds, that third party can freeze accounts and assist in department’s Bitcoin wallet. You will need to know the
the seizure of funds left online. Police can do so using credentials for accessing the department Bitcoin wallet.
the same method to freeze traditional bank accounts, If there is no existing department Bitcoin wallet, DO
but the warrant or subpoena must be directed at the NOT use a personal Bitcoin wallet.
online wallet operator. Without a Bitcoin wallet, you cannot continue
through the collection process. Please proceed to the
Hardware wallets: Because hardware wallets are “Preservation” section on page 14.
external memory or paper QR codes containing private
keys, they must be loaded into a wallet that allows Step 3
private keys to be imported. For an officer seizing Depending on the type of Bitcoin wallet encountered,
the property of a suspect, it is sufficient to secure the follow the below process.
hardware wallet and get it into the hands of an IT
specialist as soon as possible. Mobile wallets: If the suspect is using a mobile wallet,
the process for making a transfer is relatively simple.
Often the private keys in a Bitcoin wallet will be hidden, In the suspect’s wallet, navigate to the transfer or send
but as long as the officer has access to the wallet the tab. Enter the department wallet’s address or scan its
funds can be transferred. QR code in the space labeled recipient. Enter the full
value of the wallet as the amount to be transferred.
It is important to remember that a wallet may actually Then press transfer or send to move the funds to the
have multiple files that are holding Bitcoin separately. department wallet.
If an officer is transferring funds from an open or
unencrypted wallet, they should ensure that there Software wallets: Generally, funds can be obtained
are not multiple files in the wallet. There should be a from a software wallet using the same method as a
tab that allows all the wallets within the program to mobile wallet. However, with a software wallet, the
be viewed. It is possible that individual wallets may be suspect’s private keys may be available either within
separately encrypted within the program. If that is the the wallet or stored elsewhere on the device. Access
case, then the device should be seized as an encrypted to a suspect’s private keys gives indefinite access to the
device. accounts associated with those keys. While it is not
recommended that the officer attempt to access the
How to seize Bitcoin not protected by encryption. private keys, it is important that the device is treated as
an encrypted device and seized, even if the officer can
Step 1 transfer the Bitcoins.
As in all cases involving evidence, responding personnel
should thoroughly document the scene. Online wallets: If a suspect is using an online wallet,
13
Ref # 8091-4ee9-ae43-3d3759fc46fb
2018-46528652
Bitcoin Basics
police can use the above method to transfer funds. PRESERVATION SECTION
Because online wallets use a third party to store Bitcoin
funds, that third party can freeze accounts and assist in Prior to Collection
the seizure of funds left online. Police can do so using
the same method to freeze traditional bank accounts, Preservation of a suspect’s Bitcoin is especially
but the warrant or subpoena must be directed at the important when the suspect may have co-conspirators.
online wallet operator. A third party with access to the suspect’s private keys
can drain the suspect’s wallet of its funds before the
Hardware wallets: Because hardware wallets are officer can access the wallet.
external memory or paper QR codes containing private
keys, they must be loaded into a wallet that allows Being proactive when Bitcoin is suspected to be in use
private keys to be imported. For an officer seizing is the best course of action. Having a department wallet
the property of a suspect, it is sufficient to secure the and proper procedures in place before alerting the
hardware wallet and get it into the hands of an IT suspect to possible seizure of his or her assets will help
specialist as soon as possible. streamline the process and minimize the risk of loss.
Often the private keys in a Bitcoin wallet will be hidden, If it is not possible to transfer the Bitcoin to a controlled
but as long as the officer has access to the wallet the wallet immediately, treat the device as though it is
funds can be transferred. encrypted. As such, officers should leave the device
on. Move the mouse to avoid the device entering sleep
It is important to remember that a wallet may actually mode; on a smart phone or other mobile device, it may
have multiple files that are holding Bitcoins separately. be necessary to tap the screen. On a phone or mobile
If an officer is transferring funds from an open or device, it is important not to search the phone without a
unencrypted wallet, they should ensure that there proper specific warrant. Document the scene and leave
are not multiple files in the wallet. There should be a as much of it unaltered as possible. As soon as possible,
tab that allows all the wallets within the program to call a digital forensic expert for further instructions.
be viewed. It is possible that individual wallets may be
separately encrypted within the program. If that is the If the suspect has Bitcoin stored on a web based wallet,
case, then the device should be seized as an encrypted then the wallet provider can freeze the account with
device. the proper administrative procedure, such as a warrant
or a subpoena. Bitcoin stored on web-based wallets are
Step 4 especially vulnerable, so time is a significant factor.
By successfully transferring Bitcoins from the suspect’s
wallet to the department, he/she (or anyone with access After Collection
to the suspect’s wallet) is no longer in possession of the
Once a suspect’s Bitcoin are in the department’s
Bitcoins.
Bitcoin wallet, they will be fairly safe and secure. If the
department is using a web-based wallet, ensuring that
The department’s Bitcoin wallet should have controlled
the department is on a secure server or transferring
access to maintain accountability and integrity in the
the coin to either a software wallet and encrypting the
preservation of the digital evidence.
wallet or placing the Bitcoin in cold storage can provide
additional security.
14
Ref # 8091-4ee9-ae43-3d3759fc46fb
2018-46528652
Bitcoin Basics
parties approve of the transfer. Using a vault may The blockchain is much like a full history of banking
provide even more security for the Bitcoin. However, transactions, while blocks function as individual bank
once the Bitcoin have been transferred to a wallet statements.
controlled by law enforcement, the Bitcoin should be
safe and adequately preserved. Based on the Bitcoin protocol, the blockchain database
is shared by all nodes participating in a system. The
Online wallets full copy of the blockchain has records of every Bitcoin
Web-based wallet services and Bitcoin exchanges have transaction ever executed. It can thus provide insight
historically been cooperative with law enforcement about facts like how much value belonged a particular
investigations. In the event you cannot seize Bitcoin address at any point in the past.
from a suspect’s wallet, attempt to obtain any username,
ID or wallet number that may help identify the wallet The blockchain is of particular interest to law
in question. enforcement due to its inability to be altered in any way.
15
Ref # 8091-4ee9-ae43-3d3759fc46fb
2018-46528652
Bitcoin Basics
16
Ref # 8091-4ee9-ae43-3d3759fc46fb
2018-46528652
Bitcoin Basics
ROCIC:
Publications Manager Mark Zimmerman, mzimmerman@rocic.riss.net
Training Manager Ms. Jarret Miller, jamiller@rocic.riss.net
Criminal Intelligence Unit Manager Kendall Neal, kneal@rocic.riss.net
Analytical Unit Manager Cindy Purviance at cpurviance@rocic.riss.net
ROCIC, 1-800-238-7985
“Penetrating the Darknet: Silk Road, Bitcoins, and the Onion Router,” ROCIC Special Research Report
http://rocic.riss.net/publications/darknet/Pages/default.aspx
“Hack Attack! Protecting Data Networks From Cyber Criminals,” ROCIC Special Research Report
http://rocicuag.riss.net/publications/hack_attack/Pages/default.aspx
BOOKS:
Good Money, Part I: The New World, by F. A. Hayek, Ed. By Stephen Kresge, Liberty Fund Press, 1999
Good Money, Part II: The Standard, by F. A. Hayek, Ed. By Stephen Kresge, The University of Chicago Press, 1999
Denationalization of Money: The Argument Refined, by F. A. Hayek, The Institute of Economic Affairs, 1990
The Ascent of Money: A Financial History of the World, by Niall Ferguson, Penguin Press, 2008
Free to Choose: A Personal Statement, by Milton Friedman and Rose Friedman, Harvest Book, 1980
The Psychology of Communication (The Magic Number Seven essay), by George Miller, Penguin Press, 1969
The General Theory of Employment, Interest, and Money, by John Maynard Keynes, Harvest Book, 1964
LocalBitcoins.com
https://localBitcoins.com/accounts/login/
Bitcoin Foundation
https://Bitcoin.org/en/faq
Coinbase
https://www.coinbase.com/what-is-Bitcoin
17
Ref # 8091-4ee9-ae43-3d3759fc46fb
2018-46528652
Bitcoin Basics
Bitcoin Stats
https://blockchain.info/stats
CoinDesk
http://www.coindesk.com/
GOVERNMENT WEBSITES:
MEDIA WEBSITES:
BloombergView (currency-Bitcoin)
http://www.bloombergview.com/topics/currency
Wired magazine
http://www.wired.com/tag/Bitcoin/
COMMERCIAL WEBSITES:
Elliptic
https://www.elliptic.co/
Chainalysis
https://www.chainalysis.com/
BlockSeer
https://www.blockseer.com
18
Ref # 8091-4ee9-ae43-3d3759fc46fb
2018-46528652
Bitcoin Basics
This project was supported by Grant #2015-RS-CX-0005 awarded by the Bureau of Justice Assistance. The Bureau of Justice Assistance
is a component of the Department of Justice’s Office of Justice Programs, which also includes the Bureau of Justice Statistics, the National
Institute of Justice, the Office of Juvenile Justice and Delinquency Prevention, the Office for Victims of Crime, and the SMART Office. Points
of view or opinions in this document are those of the author and do not necessarily represent the official position or policies of the U.S.
Department of Justice.
19
Ref # 8091-4ee9-ae43-3d3759fc46fb