Bitcoin, created in 2008, has become the most widely accepted virtual currency in the world. Some believe that Bitcoin will play a significant role in both e-commerce and money transfers, whereas others believe that Bitcoin transactions are more likely to be used by criminals creating fraudulent investments and engaging in drug trafficking and money laundering. This study addresses (1) whether the traditional criminological concepts are applicable in explaining criminal activities in virtual space, (2) what factors contribute to Bitcoin-related offenses, and (3) what lessons could be learned from the current study of Bitcoin-related criminal cases.
This is a preview of subscription content, log in to check access.
Buy single article
Instant access to the full article PDF.
Tax calculation will be finalised during checkout.
Subscribe to journal
Immediate online access to all issues from 2019. Subscription will auto renew annually.
Tax calculation will be finalised during checkout.
A node refers to a full client who stores the blockchain and can share the blocks and transactions across the network with all the transactions as opposed to a lightweight client who operates without storing the full blockchain (Drost, 2017).
In United States of America v. Ross William Ulbricht, a.k.a. “Dread Pirate Roberts,” a.k.a. “DPR,” a.k.a. “Silk Road” (2014), Ulbricht was charged with conspiring to violate U.S. narcotics laws; knowingly and intentionally using a communication facility to commit a felony; and conspiring to commit computer hacking. He was sentenced to life imprisonment and 5 years, 15 years, and 20 years imprisonment for each of the three other counts. He was also ordered to pay a monetary penalty of $500.00 and forfeiture of $183,961,921.00.
Jones and Davis were site administrators on Silk Road. Nash, an Australian citizen, was the primary moderator on the Silk Road discussion forums. They were charged with narcotics trafficking conspiracy and computer hacking conspiracy. Nash pleaded guilty and faces a mandatory minimum sentence of 10 years and a possible deportation. Jones also pleaded guilty as a government witness; Davis is in Ireland and he is awaiting extradition to the United States (see United States of America v. Andrew Michael Jones, Gary Davis, and Peter Phillip Nash, 2015). Clark was a senior adviser to Ross Ulbricht, the owner and operator of the Silk Road website. Clark advised Ulbricht on a regular basis regarding various aspects of operating the website. He was also charged with narcotics trafficking conspiracy and money laundering conspiracy and is awaiting sentencing (United States of America v. Roger Thomas Clark, 2015).
Sadler, White, and Donagal were drug vendors on Silk Road. Sadler was charged with conspiracy to distribute drugs. He was sentenced to five years of incarceration (see United States of America v. Steven Lloyd Sadler and Jenna M. White, 2013). Donegal and his codefendants were charged with conspiracy to manufacture and possess with intent to distribute drugs, sale of counterfeit drugs, and international money laundering. He was sentenced to serve 70 months (see United States of America v. Jeremy Donagal [a.k.a. “Xanax King,” a.k.a. “XK”] et al. ).
Faiella and Shrem provided a Bitcoin exchange service between Silk Road and their customers. They were charged with operating an unlicensed money-transmitting business and conspiracy to commit money laundering. Shrem received two years of imprisonment and forfeiture of $950,000.00 and Faiella was sentenced to four years of imprisonment and forfeiture of $950,000.00 (see United States of America v. Robert M. Faiella, a.k.a. “BTCKing” and Charlie Shrem ( 2013 ).
Force and Bridges were federal agents assigned to the Baltimore Silk Road Task Force to investigate illegal activity in the Silk Road marketplace. Force used fictitious personas (e.g., “French Maid”) to communicate with Ulbricht, and threatened to expose him if he did not pay him. Both agents were charged with wire fraud and money laundering. Force received three years of incarceration and Bridges received six years of incarceration (see, United States of America v. Carl Mark Force and Shaun W. Bridges, 2015).
A controlled delivery is a technique used by law enforcement when they know that illegal drugs are detected but allowed to move forward under the control and surveillance of law enforcement so that they could monitor the activities.
Ali Shukri Amin was a Virginia resident who was accused of providing material support and assistance to the Islamic State in Iraq. He ran a Twitter account called @AmreekiWitness and asked followers to support financially ISIL using BTCs (see United States of America v. Ali Shukri Amin, 2015; Counter-Extremism Project, 2015). He was sentenced to 11 years in prison.
Afilipoaie, A., & Shortis, P. (2015). From dealer to doorstep-how drugs are sold on the dark net. Global Drug Policy Observatory situation analysis. Retrieved November 15, 2015, from http://www.swansea.ac.uk/media/Dealer%20to%20Doorstep%20FINAL%20SA.pdf
Bitcoin Charts. (2015). Retrieved November 15, 2015, from https://bitcoincharts.com/bitcoin/.
Bitcoin mining guide – Getting started with Bitcoin mining. (n.d.). Retrieved from https://www.bitcoinmining.com/getting-started/
BitcoinTicker. (2013). Retrieved November 10, 2015, from http://bitcointicker.com/.
Blockchain. (2017, April 13). Bitcoins in circulation. Retrieved April 15, 2017, from https://blockchain.info/charts/total-bitcoins
Bohannon, J. (2016, March). Why criminals can’t hide behind Bitcoin. Science. Retrieved October 15, 2016, from http://www.sciencemag.org/news/2016/03/why-criminals-cant-hide-behind-bitcoin
Brenner, S. W. (2001). Is there such a thing as “virtual crime?” California Criminal Law Review, 4. Doi:10.15779/Z38MC94.
Brenner, S. W. (2002). Organized cybercrime-how cyberspace may affect the structure of criminal relationships. North Carolina Journal of Law & Technology, 4(1), 1–50.
Christin, N. (2013). Traveling the silk road: A measurement analysis of large anonymous online marketplace, 22nd International World Wide Web Conference (pp.213–224). Rio de Janeiro: Brazil. doi:10.1145/2488388.2488408.
CoinDesk. (2015, March 20). How do bitcoin transactions work? Retrieved April 14, 2017, from http://www.coindesk.com/information/how-do-bitcoin-transactions-work/
CoinDesk. (2017, April 14). Bitcoin price index chart. Retrieved April 14, 2017, from http://www.coindesk.com/price/
Danquah, P., & Longe, O. B. (2011). An empirical test of the space transition theory of cyber criminality: The case of Ghana and beyond. African Journal of Computing & ICTs, 4(2), 37–48.
Drost, N. (2017). Let’s dive into the world of Blockchain. Retrieved March 5, 2016, from https://blockchainedu.org/learn/?gclid=CK7ehqn-gtACFZKGaQodXDAGbw#.
Eyal, I., & Sirer, E. G. (2014). Majority is not enough: Bitcoin mining is vulnerable, In International conference on financial cryptography and data security. (pp. 436–454). Berlin Heidelberg: Springer Retrieved April 14, 2017, from https://www.cs.cornell.edu/~ie53/publications/btcProcFC.pdf.
Federal Election Commission. (2014). Advisory opinions, 2014–02 Retrieved March 5, 2016, from http://saos.fec.gov/aodocs/2014-02.pdf.
Grabosky, P. N. (2001). Virtual criminality: Old wine in new bottles? Social & Legal Studies, 10(2), 243–249.
Grinberg, R. (2011). Bitcoin: An innovative alternative digital currency. Hastings Science & Technology Law Journal, 4(1), 159–208.
Hall, M. A., & Wright, R. F. (2008). Systematic content analysis of judicial opinions. California Law Review, 96(1), 63–122 Retrieved March 5, 2016, from http://scholarship.law.berkeley.edu/cgi/viewcontent.cgi?article=1186&context=californialawreview.
Holt, T. (2015). Crime online: Correlates, causes, and context. In T. Holt (Ed.), Crime online: Correlates, causes, and context (pp. 3–27). Durham, NC: Carolina Academic Press.
Holt, T., & Bossler, A. (2008). Examining the applicability of lifestyle-routine activities theory for cybercrime victimization. Deviant Behavior, 30(1), 1–25.
Holt, T. J., Burruss, G. W., & Bossler, A. M. (2010). Social learning and cyber deviance: Examining the importance of a full social learning model in the virtual world. Journal of Crime and Justice, 33, 15–30.
Hout, M. C. V., & Bingham, T. (2013). “Surfing the silk road”: A study of users’ experiences. International Journal of Drug Policy, 24(6), 524–529.
Hutchings, A. (2016). Cybercrime trajectories: An integrated theory of initiation, maintenance and desistance. In T. Holt (Ed.), Crime online: Correlates, causes, and context (3rd ed., pp. 117–139). Durham, NC: Carolina Academic Press.
Internal Revenue Service. (2014). Notice 2014–21. Retrieved March 5, 2016, from https://www.irs.gov/pub/irs-drop/n-14-21.pdf.
Jaishankar, K. (2007). Establishing a theory of cyber crimes. International Journal of Cyber Criminology, 1(2), 7–9.
Jaishankar, K. (2008). Space transition theory of cyber crimes. In F. Schmallager & M. Pittaro (Eds.), Crimes of the Internet (pp. 283–301). Upper Saddle River, NJ: Prentice Hall.
Kaplanov, N. (2012). Nerdy money: Bitcoin, the private digital currency, and the case against its regulation. Loyola Consumer Law Review, 25(1), 111–174.
Lane, J. (2014). Bitcoin, silk road, and the need for a new approach to virtual currency regulation. Charleston Law Review, 8, 511–535 Retrieved October 10, 2015, from http://heinonline.org/HOL/LandingPage?handle=hein.journals/charlwrev8&div=25&id=&page=.
Leukfeldt, E. R., & Yar, M. (2016). Applying routine activity theory to cybercrime: A theoretical and empirical analysis. Deviant Behavior, 37(3), 263–280.
LexisNexis. (n.d.). LexisNexis Academic. Retrieved March 15, 2016, from http://www.lexisnexis.com/en-us/home.page.
Manning, W. D., & Smock, P. J. (2005). Measuring and modeling cohabitation: New perspectives from qualitative data. Journal of Marriage and Family, 67(4), 989–1002.
Meiklejohn, S., Pomarole, M., Jordan, G., Levchenko, K., McCoy, D., Voelker, G., & Savage, S. (2016). A fistful of bitcoins: Characterizing payments among men with no names. Communications of the Association of Computing Machinery, 59(4), 86–93.
Mihm, S. (2013, November 18). Are bitcoins the criminal’s best friend? Bloomberg view. Retrieved October 10, 2015, from https://www.bloomberg.com/view/articles/2013-11-
Moore, T., & Christin, N. (2013). Beware the middleman: Empirical analysis of Bitcoin-exchange risk. Retrieved March 5, 2017, from http://fc13.ifca.ai/proc/1-2.pdf.
Morris, R. G. (2011). Computer hacking and the techniques of neutralization: An empirical assessment. In T. J. Holt & B. H. Schell (Eds.), Corporate hacking and technology-driven crime: Social dynamics and implications (pp. 1–17). Hershey, NY: IGI Global.
Morris, R. G., & Higgins, G. E. (2010). Criminological theory in the digital age: The case of social learning theory and digital piracy. Journal of Criminal Justice, 38(4), 470–480.
Nakamoto, S. (2008). Bitcoin: A peer-to-peer electronic cash system. Retrieved October 10, 2016, from https://bitcoin.org/bitcoin.pdf
Osborne, C. (2015). Hackers blackmailed Silk Road underground. Retrieved February 25, 2017, from http://www.zdnet.com/article/hackers-blackmailed-silk-road-underground/
Pacia, C. (2013, December 30). Beginners’ Guide to PGP. Retrieved February 13, 2017, from http://www.bitcoinnotbombs.com/beginners-guide-to-pgp/
Counter-Extremism Project. (2015). United States of America v. Ali Shukri Amin. Retrieved May 2, 2016, from http://www.counterextremism.com/extremists/ali-shukri-amin
Public Access to Court Electronic Records (PACER). (n.d.). Search the PACER Case Locator. Retrieved November 30, 2015, from PACER: https://www.pacer.gov/.
Reid, F., & Harrigan, M. (2013). An analysis of anonymity in the bitcoin system. In Y. Altshuler & Y. Elovici (Eds.), Security & privacy in social networks (pp. 197–223). New York, NY: Springer.
Securities and Exchange Commission v. Trendon T. Shavers and Bitcoin Savings and Trust. (2013). U.S. District Court for the Eastern District of Texas, Sherman Division. Retrieved March 22, 2016, from https://www.sec.gov/litigation/complaints/2013/comp-pr2013-132.pdf
State of Florida v. Michell Abner Espinoza. (2016). Circuit Court of the Eleventh Judicial Circuit in and for Miami-Dade County, Florida. Retrieved February 13, 2017 from http://www.miamiherald.com/latest-news/article91701087.ece/BINARY/Read%20the%20ruling%20(.PDF)
Sutherland, E. H. (1947). Principles of criminology. Philadelphia, PA: J. B. Lippincott.
Sykes, G. M., & Matza, D. (1957). Techniques of neutralization: A theory of delinquency. American Sociological Review, 22(6), 664–670.
Tepper, F. (2016, July). 9. Tech Crunch: The reward for mining Bitcoin was just cut in half Retrieved from https://techcrunch.com/2016/07/09/the-reward-for-mining-bitcoin-was-just-cut-in-half/.
Tor Project. (n.d.). Tor. Retrieved October 10, 2015, from https://www.torproject.org/.
United States of America v. Ali Shukri Amin. (2015, June 11). Plea agreement, 1–16. Retrieved November 9, 2016, from https://www.justice.gov/opa/file/477366/download
United States of America v. Andrew Michael Jones, Gary Davis, and Peter Phillip Nash. (2015, December 19). Indictment, 1–-13. Retrieved November 9, 2016, from https://www.justice.gov/sites/default/files/usao-sdny/legacy/2015/03/25/Jones,%20Andrew,%20et%20al%20(Silk%20Road)%20Indictment.pdf
United States of America v. Anthony Murgio, Yuri Lebedev and Trenvon Gross. (2016). Indictment, 1–8. Retrieved November 9, 2016, from https://www.justice.gov/usao-sdny/file/830616/download
United States of America v. Carl Mark Force and Shaun W. Bridges. (2015, March 25). Complaints, 1–95, Retrieved November 9, 2016, from https://www.justice.gov/sites/default/files/opa/press-releases/attachments/2015/03/30/criminal_complaint_forcev2.pdf
United States of America v. Gery Shalon, Joshua Samuel Aaron, & Ziv Orenstein. (2015). Retrieved November 9, 2016, from http://online.wsj.com/public/resources/documents/2015_1110_shalon.pdf
United States of America v. Jeremy Donagal (a.k.a. “Xanax King,” a.k.a. “XK), et al. (2014, May 22). Indictment, 1–27. Retrieved January 20, 2016, from https://www.justice.gov/sites/default/files/usao-ndca/legacy/2014/06/02/DONAGAL,%20et%20al%20-%20Indictment.pdf
United States of America v. Robert M. Faiella, a.k.a. “BTCKing” and Charlie Shrem. (2013, Jan 24). Complaints, 1–27. Retrieved January 20, 2016, from https://www.wired.com/images_blogs/threatlevel/2014/01/Faiella-Robert-M.-and-Charlie-Shrem-Complaint.pdf
United States of America v. Roger Thomas Clark. (2015, April 21). Complaints, 1–17. Retrieved March 20, 2016, from https://www.justice.gov/usao-sdny/file/797251/download
United States of America v. Ross William Ulbricht, a.k.a. “Dread Pirate Roberts,” a.k.a. “DPR,” a.k.a. “Silk Road.” (2014, February 4). Indictments, 1–12. Retrieved January 20, 2016, from https://www.justice.gov/sites/default/files/usao-sdny/legacy/2015/03/25/US%20v.%20Ross%20Ulbricht%20Indictment.pdf
United States of America v. Steven Lloyd Sadler, and Jenna M. White. (2013, October 12). Complaints, 1–16. Retrieved January 20, 2016, from http://www.frank-cs.org/cms/pdfs/DOJ/US_Sadler_Complaint_2.10.13.pdf
Volastro, A. (2014, January 23). CNBC explains: How to mine bitcoins on your own. CNBC. Retrieved April 14, 2017, from http://www.cnbc.com/2014/01/23/cnbc-explains-how-to-mine-bitcoins-on-your-own.html
Wall, D. (2001). Cybercrimes and the Internet. In S. Wall (Ed.), Crime and the Internet (pp. 1–17). New York, NY: Routledge.
Wechsler, P. (2016). "Dark web" gives cover to criminals. Issue: Cyber Security Retrieved October 10, 2016, from http://businessresearcher.sagepub.com/sbr-1775-98146-2715485.
Weimann, G. (2016). Terrorist migration to the dark web. Perspectives on Terrorism, 10(3), 40–44.
About this article
Cite this article
Kethineni, S., Cao, Y. & Dodge, C. Use of Bitcoin in Darknet Markets: Examining Facilitative Factors on Bitcoin-Related Crimes. Am J Crim Just 43, 141–157 (2018). https://doi.org/10.1007/s12103-017-9394-6
- Silk Road
- Space transition theory