Skip to main content

Bitcoin: Perils of an Unregulated Global P2P Currency

  • Conference paper
  • First Online:
Security Protocols XXIII (Security Protocols 2015)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 9379))

Included in the following conference series:

Abstract

Bitcoin has, since 2009, become an increasingly popular online currency, in large part because it resists regulation and provides anonymity. We discuss how Bitcoin has become both a highly useful tool for criminals and a lucrative target for crime, and argue that this arises from the same essential ideological and design choices that have driven Bitcoin’s success to date. In this paper, we survey the landscape of Bitcoin-related crime, such as dark markets and bitcoin theft, and speculate about possible future possibilities, including tax evasion and money laundering.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Bustillos, M.: The bitcoin boom. The New Yorker, April 2013. http://www.newyorker.com/tech/elements/the-bitcoin-boom

  2. Kitco news. 2013: Year of the Bitcoin. Forbes, 10 December 2013. http://www.forbes.com/sites/kitconews/2013/12/10/2013-year-of-the-bitcoin/

  3. CoinMarketCap. Crypto-Currency Market Capitalizations. BitcoinTalk, 28 July 2014. https://coinmarketcap.com/

  4. Langley, H.: Bitcoin value surges as microsoft starts accepting cryptocurrency. TechRadar, 11 December 2014. http://www.techradar.com/news/internet/bitcoin-value-surges-as-microsoft-starts-accepting-cryptocurrency-1276552

  5. Barratt, M.J.: Silk road: ebay for drugs. Addiction (2012)

    Google Scholar 

  6. Dingledine, R., Mathewson, N., Syverson, P.: Tor: The second-generation onion router. In: Proceedings of the 13th Conference on USENIX Security Symposium - Volume 13, SSYM 2004, Berkeley. USENIX Association (2004)

    Google Scholar 

  7. Aldridge, J., Décary-Hétu, D.: Not an ‘Ebay for Drugs’: the cryptomarket ‘Silk Road’ as a paradigm shifting criminal innovation. In: Social Science Research Network Working Paper Series, May 2014

    Google Scholar 

  8. Mail, D.: Mastermind behind \(\$\)180M ‘eBay of drugs’ silk road convicted after jury deliberates just three hours, 4 February 2015

    Google Scholar 

  9. Stuff. Silk Road Drug Buyers in Court, 3 December 2014. http://www.stuff.co.nz/auckland/63779228/Silk-Road-drug-buyers-in-court

  10. FBI. Operator of Silk Road 2.0 Website Charged in Manhattan Federal Court, 6 November 2014. http://www.fbi.gov/newyork/press-releases/2014/operator-of-silk-road-2.0-website-charged-in-manhattan-federal-court

  11. Wong, J.I.: Dark markets grow bigger and bolder in year since silk road bust. CoinDesk, 6 October 2014. http://www.coindesk.com/dark-markets-grow-bigger-bolder-year-since-silk-road-bust/

  12. DeepDotWeb. Interview with Grams Search Engine Admin: Exciting Features Ahead!, 3 May 2014. http://www.deepdotweb.com/2014/05/03/interview-with-grams-search-engine-admin-exciting-features-ahead/

  13. Macyoung, M., Pfouts, C.: Safe in the City. Paladin Press, USA (1994)

    Google Scholar 

  14. Macyoung, M.: Violence, Blunders and Fractured Jaws: Advanced Awareness Techniques and Street Etiquette. Paladin Press, USA (1992)

    Google Scholar 

  15. Olson, P.: The man behind silk road - the internet’s biggest market for illegal drugs. The Guardian, 10 November 2013. http://www.theguardian.com/technology/2013/nov/10/silk-road-internet-market-illegal-drugs-ross-ulbricht

  16. Infante, A.: Coin report: how many lives did silk road save. CoinReport, 26 June 2014. https://coinreport.net/many-lives-silk-road-save/

  17. Decker, Christian, Wattenhofer, Roger: Bitcoin transaction malleability and MtGox. In: Kutyłowski, Mirosław, Vaidya, Jaideep (eds.) ICAIS 2014, Part II. LNCS, vol. 8713, pp. 313–326. Springer, Heidelberg (2014)

    Google Scholar 

  18. Moore, T., Christin, N.: Beware the middleman: empirical analysis of bitcoin-exchange risk. In: Sadeghi, A.-R. (ed.) FC 2013. LNCS, vol. 7859, pp. 25–33. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  19. Higgins, S.: Bitstamp claims \(\$\)5 million lost in hot wallet hack. CoinDesk, 5 January 2015. http://www.coindesk.com/bitstamp-claims-roughly-19000-btc-lost-hot-wallet-hack/

  20. Greenberg, A.: Nearly 150 Breeds of Bitcoin-stealing Malware in The Wild, Researchers Say, Forbes, 26 February 2014. http://www.forbes.com/sites/andygreenberg/2014/02/26/nearly-150-breeds-of-bitcoin-stealing-malware-in-the-wild-researchers-say/

  21. Hern, A.: A history of bitcoin hacks. The Guardian, 18 March 2014. http://www.theguardian.com/technology/2014/mar/18/history-of-bitcoin-hacks-alternative-currency

  22. Young, A., Yung, M.: Malicious Cryptography: Exposing Cryptovirology. Wiley, New York (2004)

    Google Scholar 

  23. Blue, V.: CryptoLocker’s crimewave: a trail of millions in laundered bitcoin. ZDnet, 22 December 2013. http://www.zdnet.com/article/cryptolockers-crimewave-a-trail-of-millions-in-laundered-bitcoin/

  24. Goodin, D.: We “will be paying no ransom,” vows town hit by Cryptowall ransom malware. Ars Technica, 7 June 2014. http://arstechnica.com/security/2014/06/we-will-be-paying-no-ransom-vows-town-hit-by-cryptowall-ransom-malware/

  25. Walter, J.: Meet ‘Tox’: ransomware for the rest of us. McAfee Labs - Blog Central, 23 May 2015. https://blogs.mcafee.com/mcafee-labs/meet-tox-ransomware-for-the-rest-of-us

  26. Huang, D.Y., Dharmdasani, H., Meiklejohn, S., Dave, V., Grier, C., McCoy, D., Savage, S., Weaver, N., Snoeren, A.C., Levchenko, K.: Botcoin: monetizing stolen cycles. In: Proceedings of the Network and Distributed System Security Symposium (NDSS) (2014)

    Google Scholar 

  27. Tung, L.: NAS device botnet mined \(\$\)600,000 in dogecoin over two months. ZDnet, 18 June 2014. http://www.zdnet.com/article/nas-device-botnet-mined-600000-in-dogecoin-over-two-months/

  28. Torpey, K.: Bitcoin and tax evasion: are the possibilities overstated? Inside Bitcoins, 28 October 2014. http://insidebitcoins.com/news/bitcoin-and-tax-evasion-are-the-possibilities-overstated/25805

  29. Surowiecki, J.: The underground recovery. The New Yorker, 29 April 2013. http://www.newyorker.com/magazine/2013/04/29/the-underground-recovery

  30. Wald, J.: How an exploding freelance economy will drive change in 2014. Forbes, 25 November 2013. http://www.forbes.com/sites/groupthink/2013/11/25/how-an-exploding-freelance-economy-will-drive-change-in-2014/

  31. Palmer, K.: FACTA: new federal law causes swiss banks to reject american investors. Watchdog Wire, 23 October 2012. http://watchdogwire.com/blog/2012/10/23/facta-new-federal-law-causes-swiss-banks-to-reject-american-investors/

  32. Stokes, R.: Virtual money laundering: the case of bitcoin and the linden dollar. Inf. Commun. Technol. Law 21(3), 221–236 (2012)

    Article  Google Scholar 

  33. Moser, M., Bohme, R., Breuker, D.: An inquiry into money laundering tools in the bitcoin ecosystem. In: eCrime Researchers Summit (eCRS). IEEE (2013)

    Google Scholar 

  34. Sparshott, J.: Web money gets laundering rule. Wall Street J. 21 March 2013. http://www.wsj.com/articles/SB10001424127887324373204578374611351125202

  35. McCallion, J.: Europol calls for greater bitcoin policing powers. ITPro, 25 March 2014. http://www.itpro.co.uk/public-sector/21903/europol-calls-for-greater-bitcoin-policing-powers

  36. Kirk, J.: Could the bitcoin network be used as an ultrasecure notary service? PCWorld, 24 May 2013. http://www.pcworld.com/article/2039705/could-the-bitcoin-network-be-used-as-an-ultrasecure-notary-service.html

  37. Bradbury, D.: BlockSign utilises block chain to verify signed contracts. CoinDesk, 27 August 2014. http://www.coindesk.com/blocksign-utilises-block-chain-verify-signed-contracts/

  38. Counterparty: Pioneering Peer-to-Peer Finance. Accessed 22 July 2014

    Google Scholar 

  39. Fox-Brewster, T.: Bitcoin’s blockchain offers safe haven for malware and child abuse, warns interpol. Forbes, 27 March 2015. http://www.forbes.com/sites/thomasbrewster/2015/03/27/bitcoin-blockchain-pollution-a-criminal-opportunity/

  40. Ali, S.T., McCorry, P., Lee, P.H.-J., Hao, F.: ZombieCoin: powering next-generation botnets with bitcoin. In: 2nd Workshop on Bitcoin Research (2015)

    Google Scholar 

  41. Gervais, A., Karame, G.O., Capkun, V., Capkun, S.: Is bitcoin a decentralized currency? IEEE Secur. Priv. 12(3), 54–60 (2014)

    Article  Google Scholar 

  42. Möser, M., Böhme, R., Breuker, D.: Towards risk scoring of bitcoin transactions. In: Böhme, R., Brenner, M., Moore, T., Smith, M. (eds.) FC 2014 Workshops. LNCS, vol. 8438, pp. 16–32. Springer, Heidelberg (2014)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Syed Taha Ali .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Ali, S.T., Clarke, D., McCorry, P. (2015). Bitcoin: Perils of an Unregulated Global P2P Currency. In: Christianson, B., Švenda, P., Matyáš, V., Malcolm, J., Stajano, F., Anderson, J. (eds) Security Protocols XXIII. Security Protocols 2015. Lecture Notes in Computer Science(), vol 9379. Springer, Cham. https://doi.org/10.1007/978-3-319-26096-9_29

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-26096-9_29

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-26095-2

  • Online ISBN: 978-3-319-26096-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics