Abstract
Bitcoin has, since 2009, become an increasingly popular online currency, in large part because it resists regulation and provides anonymity. We discuss how Bitcoin has become both a highly useful tool for criminals and a lucrative target for crime, and argue that this arises from the same essential ideological and design choices that have driven Bitcoin’s success to date. In this paper, we survey the landscape of Bitcoin-related crime, such as dark markets and bitcoin theft, and speculate about possible future possibilities, including tax evasion and money laundering.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Bustillos, M.: The bitcoin boom. The New Yorker, April 2013. http://www.newyorker.com/tech/elements/the-bitcoin-boom
Kitco news. 2013: Year of the Bitcoin. Forbes, 10 December 2013. http://www.forbes.com/sites/kitconews/2013/12/10/2013-year-of-the-bitcoin/
CoinMarketCap. Crypto-Currency Market Capitalizations. BitcoinTalk, 28 July 2014. https://coinmarketcap.com/
Langley, H.: Bitcoin value surges as microsoft starts accepting cryptocurrency. TechRadar, 11 December 2014. http://www.techradar.com/news/internet/bitcoin-value-surges-as-microsoft-starts-accepting-cryptocurrency-1276552
Barratt, M.J.: Silk road: ebay for drugs. Addiction (2012)
Dingledine, R., Mathewson, N., Syverson, P.: Tor: The second-generation onion router. In: Proceedings of the 13th Conference on USENIX Security Symposium - Volume 13, SSYM 2004, Berkeley. USENIX Association (2004)
Aldridge, J., Décary-Hétu, D.: Not an ‘Ebay for Drugs’: the cryptomarket ‘Silk Road’ as a paradigm shifting criminal innovation. In: Social Science Research Network Working Paper Series, May 2014
Mail, D.: Mastermind behind \(\$\)180M ‘eBay of drugs’ silk road convicted after jury deliberates just three hours, 4 February 2015
Stuff. Silk Road Drug Buyers in Court, 3 December 2014. http://www.stuff.co.nz/auckland/63779228/Silk-Road-drug-buyers-in-court
FBI. Operator of Silk Road 2.0 Website Charged in Manhattan Federal Court, 6 November 2014. http://www.fbi.gov/newyork/press-releases/2014/operator-of-silk-road-2.0-website-charged-in-manhattan-federal-court
Wong, J.I.: Dark markets grow bigger and bolder in year since silk road bust. CoinDesk, 6 October 2014. http://www.coindesk.com/dark-markets-grow-bigger-bolder-year-since-silk-road-bust/
DeepDotWeb. Interview with Grams Search Engine Admin: Exciting Features Ahead!, 3 May 2014. http://www.deepdotweb.com/2014/05/03/interview-with-grams-search-engine-admin-exciting-features-ahead/
Macyoung, M., Pfouts, C.: Safe in the City. Paladin Press, USA (1994)
Macyoung, M.: Violence, Blunders and Fractured Jaws: Advanced Awareness Techniques and Street Etiquette. Paladin Press, USA (1992)
Olson, P.: The man behind silk road - the internet’s biggest market for illegal drugs. The Guardian, 10 November 2013. http://www.theguardian.com/technology/2013/nov/10/silk-road-internet-market-illegal-drugs-ross-ulbricht
Infante, A.: Coin report: how many lives did silk road save. CoinReport, 26 June 2014. https://coinreport.net/many-lives-silk-road-save/
Decker, Christian, Wattenhofer, Roger: Bitcoin transaction malleability and MtGox. In: Kutyłowski, Mirosław, Vaidya, Jaideep (eds.) ICAIS 2014, Part II. LNCS, vol. 8713, pp. 313–326. Springer, Heidelberg (2014)
Moore, T., Christin, N.: Beware the middleman: empirical analysis of bitcoin-exchange risk. In: Sadeghi, A.-R. (ed.) FC 2013. LNCS, vol. 7859, pp. 25–33. Springer, Heidelberg (2013)
Higgins, S.: Bitstamp claims \(\$\)5 million lost in hot wallet hack. CoinDesk, 5 January 2015. http://www.coindesk.com/bitstamp-claims-roughly-19000-btc-lost-hot-wallet-hack/
Greenberg, A.: Nearly 150 Breeds of Bitcoin-stealing Malware in The Wild, Researchers Say, Forbes, 26 February 2014. http://www.forbes.com/sites/andygreenberg/2014/02/26/nearly-150-breeds-of-bitcoin-stealing-malware-in-the-wild-researchers-say/
Hern, A.: A history of bitcoin hacks. The Guardian, 18 March 2014. http://www.theguardian.com/technology/2014/mar/18/history-of-bitcoin-hacks-alternative-currency
Young, A., Yung, M.: Malicious Cryptography: Exposing Cryptovirology. Wiley, New York (2004)
Blue, V.: CryptoLocker’s crimewave: a trail of millions in laundered bitcoin. ZDnet, 22 December 2013. http://www.zdnet.com/article/cryptolockers-crimewave-a-trail-of-millions-in-laundered-bitcoin/
Goodin, D.: We “will be paying no ransom,” vows town hit by Cryptowall ransom malware. Ars Technica, 7 June 2014. http://arstechnica.com/security/2014/06/we-will-be-paying-no-ransom-vows-town-hit-by-cryptowall-ransom-malware/
Walter, J.: Meet ‘Tox’: ransomware for the rest of us. McAfee Labs - Blog Central, 23 May 2015. https://blogs.mcafee.com/mcafee-labs/meet-tox-ransomware-for-the-rest-of-us
Huang, D.Y., Dharmdasani, H., Meiklejohn, S., Dave, V., Grier, C., McCoy, D., Savage, S., Weaver, N., Snoeren, A.C., Levchenko, K.: Botcoin: monetizing stolen cycles. In: Proceedings of the Network and Distributed System Security Symposium (NDSS) (2014)
Tung, L.: NAS device botnet mined \(\$\)600,000 in dogecoin over two months. ZDnet, 18 June 2014. http://www.zdnet.com/article/nas-device-botnet-mined-600000-in-dogecoin-over-two-months/
Torpey, K.: Bitcoin and tax evasion: are the possibilities overstated? Inside Bitcoins, 28 October 2014. http://insidebitcoins.com/news/bitcoin-and-tax-evasion-are-the-possibilities-overstated/25805
Surowiecki, J.: The underground recovery. The New Yorker, 29 April 2013. http://www.newyorker.com/magazine/2013/04/29/the-underground-recovery
Wald, J.: How an exploding freelance economy will drive change in 2014. Forbes, 25 November 2013. http://www.forbes.com/sites/groupthink/2013/11/25/how-an-exploding-freelance-economy-will-drive-change-in-2014/
Palmer, K.: FACTA: new federal law causes swiss banks to reject american investors. Watchdog Wire, 23 October 2012. http://watchdogwire.com/blog/2012/10/23/facta-new-federal-law-causes-swiss-banks-to-reject-american-investors/
Stokes, R.: Virtual money laundering: the case of bitcoin and the linden dollar. Inf. Commun. Technol. Law 21(3), 221–236 (2012)
Moser, M., Bohme, R., Breuker, D.: An inquiry into money laundering tools in the bitcoin ecosystem. In: eCrime Researchers Summit (eCRS). IEEE (2013)
Sparshott, J.: Web money gets laundering rule. Wall Street J. 21 March 2013. http://www.wsj.com/articles/SB10001424127887324373204578374611351125202
McCallion, J.: Europol calls for greater bitcoin policing powers. ITPro, 25 March 2014. http://www.itpro.co.uk/public-sector/21903/europol-calls-for-greater-bitcoin-policing-powers
Kirk, J.: Could the bitcoin network be used as an ultrasecure notary service? PCWorld, 24 May 2013. http://www.pcworld.com/article/2039705/could-the-bitcoin-network-be-used-as-an-ultrasecure-notary-service.html
Bradbury, D.: BlockSign utilises block chain to verify signed contracts. CoinDesk, 27 August 2014. http://www.coindesk.com/blocksign-utilises-block-chain-verify-signed-contracts/
Counterparty: Pioneering Peer-to-Peer Finance. Accessed 22 July 2014
Fox-Brewster, T.: Bitcoin’s blockchain offers safe haven for malware and child abuse, warns interpol. Forbes, 27 March 2015. http://www.forbes.com/sites/thomasbrewster/2015/03/27/bitcoin-blockchain-pollution-a-criminal-opportunity/
Ali, S.T., McCorry, P., Lee, P.H.-J., Hao, F.: ZombieCoin: powering next-generation botnets with bitcoin. In: 2nd Workshop on Bitcoin Research (2015)
Gervais, A., Karame, G.O., Capkun, V., Capkun, S.: Is bitcoin a decentralized currency? IEEE Secur. Priv. 12(3), 54–60 (2014)
Möser, M., Böhme, R., Breuker, D.: Towards risk scoring of bitcoin transactions. In: Böhme, R., Brenner, M., Moore, T., Smith, M. (eds.) FC 2014 Workshops. LNCS, vol. 8438, pp. 16–32. Springer, Heidelberg (2014)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Ali, S.T., Clarke, D., McCorry, P. (2015). Bitcoin: Perils of an Unregulated Global P2P Currency. In: Christianson, B., Švenda, P., Matyáš, V., Malcolm, J., Stajano, F., Anderson, J. (eds) Security Protocols XXIII. Security Protocols 2015. Lecture Notes in Computer Science(), vol 9379. Springer, Cham. https://doi.org/10.1007/978-3-319-26096-9_29
Download citation
DOI: https://doi.org/10.1007/978-3-319-26096-9_29
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-26095-2
Online ISBN: 978-3-319-26096-9
eBook Packages: Computer ScienceComputer Science (R0)