SlideShare a Scribd company logo
1 of 107
Regtech
What it is and why it is helpful
Disclaimer
● These slides contain names of specific companies. This is
for illustrative purposes only and is not intended to be seen
as an endorsement.
● The contents herein does not reflect the views or opinions of
anyone else but myself.
● I am not a lawyer.
2
What, why, and who?
3
Common acronyms
KYC - Know Your Customer
AML - Anti-money Laundering Laws
CFT - Countering Financing of Terrorism
BSA - Bank Secrecy Act
SAR - Suspicious Activity Report
PII - Personally Identifiable Information
FinCEN - Financial Crimes Enforcement Network
4
A (very) brief history of one example
Most of the agencies, bureaus, and departments that monitor and enforce these
types of laws, do so because of what has happened in the past
For instance, following the terrorist attacks on September 11, 2001, a series of
laws were enacted including the PATRIOT Act
“Title III of the PATRIOT Act amended the BSA to require financial institutions to
establish anti-money-laundering programs by establishing internal policies,
procedures, and controls, designating compliance officers, providing ongoing
employee training, testing their programs through independent audits.”
5
What does this have to do with cryptocurrencies?
6
Common catch phrases used by promoters
“Not your keys, not your coins”
“Trusted third parties are security holes”
Yet in a given day, the majority of on-chain activity
(~80%) is typically movement from one coin
intermediary to another
7
8
9
Relevant but that’s four years old…
… so let’s look at some recent headlines
10
11
12
A couple of specific addresses were added due to
their role in facilitating the liquidation of bitcoins
generated from the SamSam ransomware…
… what does that mean for other users in a
sanctioned country?
13
14
Lightning Torch
Ziya Sadr—a UK national from Wales—apparently “evaded” sanctions of Iran by
using Lightning... and telling everyone on Twitter.
Because we can see the unbroken transactions between Sadr and others, there
has been speculation that someone may have violated AML/CTF requirements.
That someone could even include infrastructure providers who acted as
intermediaries (such as Twitter):
- the Torch marketing campaign was conducted off-chain via Twitter which
does have a ToS (is also prone to bot-driven manipulation campaigns)
15
Bitcoin and all of its clones— in theory— by design have the
ability to route around third parties as well, Coinbase even
got in trouble for pointing this out in a pitch deck in 2015
16
17
18
According to Chainalysis, last year:
The U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) issued guidance on
cryptocurrencies earlier this year in response to the Petro token.
FinCEN issued an advisory on the Iranian regime's illicit activities to exploit the financial system, including
the deceptive use of digital currency to bypass sanctions.
And in November, OFAC added cryptocurrency addresses linked to individuals to its Specially Designated
Nationals (SDN) list for the first time, setting a new precedent requiring cryptocurrency businesses and
financial institutions to be prepared to react swiftly to OFAC designations in the future.
19
Speaking of FinCEN...
20
21
Powers traded ~$5 million bitcoin without filing a
SAR or obtaining a MSB license
22
23
After all these years, why’d LBC make this
announcement?
Allegedly, walls were closing in them,
especially with their role in ransomware
liquidation.
24
LBC replaced BTC-e?
25
What happened to BTC-e?
26
27
Isn’t there adult supervision now?
Nope, no widely used SRO (few members in
the VCA)
SRO: Self-regulating Organization
VCA: Virtual Commodity Association
28
29
And there is a double-edged sword when an
un(der)regulated intermediary collects PII
30
31
32
33
Then it turns out the still-living co-founder, Michael
Patryn (Omar Dhanani), is an ex-con who got
deported from the US for identity theft
34
35
How many depositors at Quadriga?
92,000 depositors or 115,000 or 350,000...
36
Why do bitcoin holders still deposit their coins with
intermediaries even though they know it is a security
hazard?
37
A user on HitBTC partaking in self-incrimination...
38
39
But special interest groups say that hacks
are on the decline? Is that true?
40
41
Okay, and what about tracing hacks?
42
Elementus tracked the CoinBene “hack”
Note: CoinBene is alleged to have had ‘fake volume’ prior to
large amounts of coins being converted into ETH on
Etherdelta
43
44
45
Don’t worry, funds are safe… SAFU!
46
47
48
Briefly mentioned earlier…
… ransomware aka ‘data kidnapping’
49
50
51
According to Coveware
The total cost of a ransomware attack can be divided into two main costs:
● First, the recovery cost:
○ These expenses cover forensic reviews and assistance in rebuilding
servers and work-stations. If a ransom is paid, then that is also a
recovery expense.
● The second, and often more expensive cost of a ransomware attack is the
total cost of downtime:
○ Downtime costs are typically 5-10x the actual ransom amount and are
measured in lost productivity (slack labor and lost revenue opportunities). 52
53
~98% of these payments were paid in bitcoin
Remaining via dash or monero
54
What’s a specific example of ransomware?
#WannaCry
55
56
57
58
59
Are you running infrastructure that is used to
process proceeds of illicit activity?
60
61
62
Guess which US payment processor allegedly
liquidated funds from the GRU?
63
64
65
66
67
Darknet markets (DNMs)
68
69
Let’s turn back the clock a few years
70
71
Evolution DNM
The previous chart visualizes the time period between January 16, 2014 – March
18, 2015.
The average number of transactions per day was 1,004 and average bitcoins per
day was 562.
However, as shown in the chart above it was not until the fall of 2014 that
Evolution hit its stride.
72
73
Evolution DNM and BitPay
Another way of looking at that same trend is the comparison: a log scale
measuring the amount of bitcoins that both BitPay (in green) and Evolution (in red)
received starting January 16, 2014.
The drop off at the end in March 2015 is related to the exit scam that Evolution
underwent (and the drop off for BitPay is related to a limitation in WalletExplorer’s
data).
74
75
According to Soska and Christin 2015
In Figure 5 and the discussion involved, prior to Operation Olympus, six large dark
net marketplaces collectively accounted for more than $600,000 in sales per day.
It is unclear how much of that activity was expressly illegal, although the paper
does attempt to break down the amount of illicit drugs being sold on the same
sites.
During the same time frame (most of 2014), volume at payment processors such
as BitPay and Coinbase were relatively flat with a few outliers during days with
speculative and media frenzies as well as ‘Bitcoin Black Friday.’
76
That’s a few years old, what does it look like
in April 2019?
77
78
What other ways can transfers be visualized?
79
80
‘Backwards looking’ into 2015
According to Chainalysis, by hiding all the intermediate steps we can begin to learn how most of the
Bitcoin ecosystem is put together (e.g., can it be split into sub systems?, is there a dark and a lit
economy?, and what is bitcoin actually used for?).
Legend:
● Blue: virtual currency exchanges
● Red: darknet markets
● Pink: coin mixers
● Green: mining pools
● Yellow: payment processors
Altogether there are 14 major exchanges tracked in blue including (in alphabetical order): Bitfinex,
Bitreserve (now Uphold), Bitstamp, BitVC (subsidiary of Huobi), BTCC (formerly BTC China), BTC-e,
Circle, Coinbase (most), Huobi, itBit, Kraken, LocalBitcoins, OKCoin and Xapo. 81
Mt Gox from 2011-2014
(according to WizSec)
82
83
84
85
The Craig Wright and David Kleinman estate claims
86
According to WizSec:
12hRmmSda9qSSEH656zBaKEbeisH6ZhdTm: ~335,000 BTC (exhibit 10)
Claimed to be owned by Wright and supposedly used to lend Kleiman 50,000 BTC
as part of a software development licensing and financing agreement. However,
this is actually an internal MtGox address, descending directly from Mark
Karpelès' famous 424,424.42424242 proof-of-solvency transaction in 2011
87
88
WizSec cont’d:
12C9c9VQLMrLi4Ffzq2wDvwrKnUPaAaNFp: 250,000 BTC (exhibit 10)
Same as above, claimed to be owned by Wright and supposedly used for a
250,000 BTC loan. However, this address actually belongs to original MtGox
founder Jed McCaleb
89
90
SIM swapping
91
92
93
Why are (anarchic) cryptocurrencies used?
From NY Post:
Crypto’s signature qualities appeal to privacy advocates
and thieves alike. Theft, said Brian Krebs, owner of the
cyber-news site KrebsOnSecurity, is “irreversible.” What
you lose, he said, you can’t get back.
94
Real-time monitoring?
95
96
97
A (brief) anatomy of a hack
The first 10 blocks that included transactions from the August 2016 Bitfinex hack
were included in blocks by the following pools (listed chronologically):
• BTCC Pool (mined the first block of the hack)
• AntPool
• ViaBTC
• AntPool
• BTCC Pool
• BW Pool
• Bitfury
• ViaBTC
• F2Pool
• F2Pool
98
Sometimes service providers are a risk too
99
100
101
Jumio cont’d
Why is this a big deal? According to one industry source:
“These guys are huge, they’re in every crypto exchange. Sounds like a
single point of failure.
If you outsource your KYC on retail you might be getting dogsh*t. They
probably just crawl a couple publicly available databases and perhaps
do a query in a paid one like Lexis Nexis and that's it. Who would check
anyway? KYC is risk-based so it's not like there's one true way of doing
it.”
102
Didn’t even touch on:
- ICOs / STOs
- “stablecoins” that aren’t stable
- Gambling / casino games (Satoshi Dice, POWH, FOMO3D)
- PTK (ultimate comedy gold)
103
But we can turn these lemons into
lemonade…
… on the horizon is a socially useful invention
104
Central bank digital currency (CBDC)
Note: there are many different proposals and models
105
106
Questions / comments?
tim@postoaklabs.com
@ofnumbers
107

More Related Content

What's hot

AMF discussion paper presentation final
AMF discussion paper   presentation finalAMF discussion paper   presentation final
AMF discussion paper presentation finalTommy Jamet
 
Magnus Jones: 2022 – The year of DAOs or Regulation?
Magnus Jones: 2022 – The year of DAOs or Regulation?Magnus Jones: 2022 – The year of DAOs or Regulation?
Magnus Jones: 2022 – The year of DAOs or Regulation?Edunomica
 
White Paper Libra Facebook April 2020
White Paper Libra Facebook April 2020White Paper Libra Facebook April 2020
White Paper Libra Facebook April 2020Rein Mahatma
 
Blockchain Expo North America 2018 - Cryptocurrency and Financial Services - ...
Blockchain Expo North America 2018 - Cryptocurrency and Financial Services - ...Blockchain Expo North America 2018 - Cryptocurrency and Financial Services - ...
Blockchain Expo North America 2018 - Cryptocurrency and Financial Services - ...Franklin Bi
 
Decentralized Finance On Blockchain and Smart Contract Based Financial Markets
Decentralized Finance On Blockchain and Smart Contract Based Financial MarketsDecentralized Finance On Blockchain and Smart Contract Based Financial Markets
Decentralized Finance On Blockchain and Smart Contract Based Financial MarketsYogeshIJTSRD
 
Stablecoin Report by G7
Stablecoin Report by G7Stablecoin Report by G7
Stablecoin Report by G7Rein Mahatma
 
Blockchain & Cryptocurrency - Part II (Jose Paul Martin)
Blockchain & Cryptocurrency - Part II (Jose Paul Martin)Blockchain & Cryptocurrency - Part II (Jose Paul Martin)
Blockchain & Cryptocurrency - Part II (Jose Paul Martin)Jose Paul Martin
 
State of Blockchain Q4 2016
State of Blockchain Q4 2016State of Blockchain Q4 2016
State of Blockchain Q4 2016CoinDesk
 
Blockchain Initial Coin Offerings - The Future for Online Investing or Regula...
Blockchain Initial Coin Offerings - The Future for Online Investing or Regula...Blockchain Initial Coin Offerings - The Future for Online Investing or Regula...
Blockchain Initial Coin Offerings - The Future for Online Investing or Regula...Alan Wunsche, MBA,CPA,CA,CBP
 
BAIConf Blockchain Alternative Investment Conference London 2018 programme bo...
BAIConf Blockchain Alternative Investment Conference London 2018 programme bo...BAIConf Blockchain Alternative Investment Conference London 2018 programme bo...
BAIConf Blockchain Alternative Investment Conference London 2018 programme bo...C Hong
 
Chris Adams: Landscape of DAO Tooling, Frameworks and Integration
Chris Adams: Landscape of DAO Tooling, Frameworks and IntegrationChris Adams: Landscape of DAO Tooling, Frameworks and Integration
Chris Adams: Landscape of DAO Tooling, Frameworks and IntegrationEdunomica
 
Blockchain for Financial Institutions (the beginning)
Blockchain for Financial Institutions (the beginning)Blockchain for Financial Institutions (the beginning)
Blockchain for Financial Institutions (the beginning)Karnan Ariaratnam
 
Crypto Currency Corporation
Crypto Currency CorporationCrypto Currency Corporation
Crypto Currency CorporationJoel Binn
 
Can a blockchain solve the trust problem?
Can a blockchain solve the trust problem?Can a blockchain solve the trust problem?
Can a blockchain solve the trust problem?Bernhard Haslhofer
 
Blockchain case study powerpoints: Brief intro
Blockchain case study powerpoints: Brief introBlockchain case study powerpoints: Brief intro
Blockchain case study powerpoints: Brief introShane Ninai
 
Digital Asset Transfer Authority Bit license comment letter (21 10-14)
Digital Asset Transfer Authority  Bit license comment letter (21 10-14)Digital Asset Transfer Authority  Bit license comment letter (21 10-14)
Digital Asset Transfer Authority Bit license comment letter (21 10-14)DataSecretariat
 

What's hot (18)

AMF discussion paper presentation final
AMF discussion paper   presentation finalAMF discussion paper   presentation final
AMF discussion paper presentation final
 
Magnus Jones: 2022 – The year of DAOs or Regulation?
Magnus Jones: 2022 – The year of DAOs or Regulation?Magnus Jones: 2022 – The year of DAOs or Regulation?
Magnus Jones: 2022 – The year of DAOs or Regulation?
 
White Paper Libra Facebook April 2020
White Paper Libra Facebook April 2020White Paper Libra Facebook April 2020
White Paper Libra Facebook April 2020
 
Blockchain Expo North America 2018 - Cryptocurrency and Financial Services - ...
Blockchain Expo North America 2018 - Cryptocurrency and Financial Services - ...Blockchain Expo North America 2018 - Cryptocurrency and Financial Services - ...
Blockchain Expo North America 2018 - Cryptocurrency and Financial Services - ...
 
Decentralized Finance On Blockchain and Smart Contract Based Financial Markets
Decentralized Finance On Blockchain and Smart Contract Based Financial MarketsDecentralized Finance On Blockchain and Smart Contract Based Financial Markets
Decentralized Finance On Blockchain and Smart Contract Based Financial Markets
 
Stablecoin Report by G7
Stablecoin Report by G7Stablecoin Report by G7
Stablecoin Report by G7
 
Blockchain & Cryptocurrency - Part II (Jose Paul Martin)
Blockchain & Cryptocurrency - Part II (Jose Paul Martin)Blockchain & Cryptocurrency - Part II (Jose Paul Martin)
Blockchain & Cryptocurrency - Part II (Jose Paul Martin)
 
State of Blockchain Q4 2016
State of Blockchain Q4 2016State of Blockchain Q4 2016
State of Blockchain Q4 2016
 
Blockchain Initial Coin Offerings - The Future for Online Investing or Regula...
Blockchain Initial Coin Offerings - The Future for Online Investing or Regula...Blockchain Initial Coin Offerings - The Future for Online Investing or Regula...
Blockchain Initial Coin Offerings - The Future for Online Investing or Regula...
 
BAIConf Blockchain Alternative Investment Conference London 2018 programme bo...
BAIConf Blockchain Alternative Investment Conference London 2018 programme bo...BAIConf Blockchain Alternative Investment Conference London 2018 programme bo...
BAIConf Blockchain Alternative Investment Conference London 2018 programme bo...
 
Chris Adams: Landscape of DAO Tooling, Frameworks and Integration
Chris Adams: Landscape of DAO Tooling, Frameworks and IntegrationChris Adams: Landscape of DAO Tooling, Frameworks and Integration
Chris Adams: Landscape of DAO Tooling, Frameworks and Integration
 
Blockchain for Financial Institutions (the beginning)
Blockchain for Financial Institutions (the beginning)Blockchain for Financial Institutions (the beginning)
Blockchain for Financial Institutions (the beginning)
 
Crypto Currency Corporation
Crypto Currency CorporationCrypto Currency Corporation
Crypto Currency Corporation
 
Blockchain solutions forum and crypto-economy
Blockchain solutions forum and crypto-economyBlockchain solutions forum and crypto-economy
Blockchain solutions forum and crypto-economy
 
Can a blockchain solve the trust problem?
Can a blockchain solve the trust problem?Can a blockchain solve the trust problem?
Can a blockchain solve the trust problem?
 
Blockchain case study powerpoints: Brief intro
Blockchain case study powerpoints: Brief introBlockchain case study powerpoints: Brief intro
Blockchain case study powerpoints: Brief intro
 
Digital Asset Transfer Authority Bit license comment letter (21 10-14)
Digital Asset Transfer Authority  Bit license comment letter (21 10-14)Digital Asset Transfer Authority  Bit license comment letter (21 10-14)
Digital Asset Transfer Authority Bit license comment letter (21 10-14)
 
Decentralized finance research
Decentralized finance researchDecentralized finance research
Decentralized finance research
 

Similar to Regtech in the era of intermediaries

Cryptocurrency seminar topic presentation using MSWord.
Cryptocurrency seminar topic presentation using MSWord.Cryptocurrency seminar topic presentation using MSWord.
Cryptocurrency seminar topic presentation using MSWord.Mohd Faiz
 
CRYPTO-CURRENCY By Sahil (G.N.D.U College, Jalandhar)
CRYPTO-CURRENCY By Sahil (G.N.D.U College, Jalandhar)CRYPTO-CURRENCY By Sahil (G.N.D.U College, Jalandhar)
CRYPTO-CURRENCY By Sahil (G.N.D.U College, Jalandhar)Sahil Arya
 
CRYPTO-CURRENCY. Ppt by Sahil (G.N.D.U college, Jalandhar)
CRYPTO-CURRENCY. Ppt by Sahil (G.N.D.U college, Jalandhar)CRYPTO-CURRENCY. Ppt by Sahil (G.N.D.U college, Jalandhar)
CRYPTO-CURRENCY. Ppt by Sahil (G.N.D.U college, Jalandhar)Sahil Arya
 
Dark Side of Decentralization – What are the Hidden Risks in a Blockchain Rev...
Dark Side of Decentralization – What are the Hidden Risks in a Blockchain Rev...Dark Side of Decentralization – What are the Hidden Risks in a Blockchain Rev...
Dark Side of Decentralization – What are the Hidden Risks in a Blockchain Rev...Tommi /. Vuorenmaa
 
Crypto currency the bitcoin
Crypto currency the bitcoinCrypto currency the bitcoin
Crypto currency the bitcoinHector Jayat
 
Truth or Dare - Cryptocurrenceis, Realities of ICOs, Risk and Opportunities
Truth or Dare - Cryptocurrenceis, Realities of ICOs, Risk and OpportunitiesTruth or Dare - Cryptocurrenceis, Realities of ICOs, Risk and Opportunities
Truth or Dare - Cryptocurrenceis, Realities of ICOs, Risk and OpportunitiesLoyalCoin
 
Truth or Dare - Cryptocurrenceis, Realities of ICOs, Risk and Opportunities
Truth or Dare - Cryptocurrenceis, Realities of ICOs, Risk and OpportunitiesTruth or Dare - Cryptocurrenceis, Realities of ICOs, Risk and Opportunities
Truth or Dare - Cryptocurrenceis, Realities of ICOs, Risk and OpportunitiesSandy Palacios
 
Who Gets to Vote in Crypto?
Who Gets to Vote in Crypto?Who Gets to Vote in Crypto?
Who Gets to Vote in Crypto?InvestingTips
 
Conceptual Issues and Basic Method of BitCoin, Cryptography, Economics & The ...
Conceptual Issues and Basic Method of BitCoin, Cryptography, Economics & The ...Conceptual Issues and Basic Method of BitCoin, Cryptography, Economics & The ...
Conceptual Issues and Basic Method of BitCoin, Cryptography, Economics & The ...Chimezie Chuta
 
Crypto currency
Crypto currencyCrypto currency
Crypto currencyAmit RJ
 
The BitcoinHeist: Classifications of Ransomware Crime Families
The BitcoinHeist: Classifications of Ransomware Crime FamiliesThe BitcoinHeist: Classifications of Ransomware Crime Families
The BitcoinHeist: Classifications of Ransomware Crime FamiliesAIRCC Publishing Corporation
 
THE BITCOINHEIST: CLASSIFICATIONS OF RANSOMWARE CRIME FAMILIES
THE BITCOINHEIST: CLASSIFICATIONS OF RANSOMWARE CRIME FAMILIESTHE BITCOINHEIST: CLASSIFICATIONS OF RANSOMWARE CRIME FAMILIES
THE BITCOINHEIST: CLASSIFICATIONS OF RANSOMWARE CRIME FAMILIESijcsit
 
CS3: Cybersecurity Extortion & Fraud
CS3: Cybersecurity Extortion & FraudCS3: Cybersecurity Extortion & Fraud
CS3: Cybersecurity Extortion & FraudPaige Rasid
 
httpswww.fbi.govnewspressrelpress-releasesfbi-expects-a-ris.docx
httpswww.fbi.govnewspressrelpress-releasesfbi-expects-a-ris.docxhttpswww.fbi.govnewspressrelpress-releasesfbi-expects-a-ris.docx
httpswww.fbi.govnewspressrelpress-releasesfbi-expects-a-ris.docxpooleavelina
 
Paybefore bitcoin hater lover
Paybefore bitcoin hater loverPaybefore bitcoin hater lover
Paybefore bitcoin hater loverFaisal Islam
 
BitRush Investor Deck
BitRush Investor DeckBitRush Investor Deck
BitRush Investor DeckBitRush Corp
 
IRJET-Concurrency, Security Issues and Upcoming Challenges to Legal Framework...
IRJET-Concurrency, Security Issues and Upcoming Challenges to Legal Framework...IRJET-Concurrency, Security Issues and Upcoming Challenges to Legal Framework...
IRJET-Concurrency, Security Issues and Upcoming Challenges to Legal Framework...IRJET Journal
 
“As a layperson -let us understand- cryptocurrency and how it works.pdf
“As a layperson -let us understand- cryptocurrency and how it works.pdf“As a layperson -let us understand- cryptocurrency and how it works.pdf
“As a layperson -let us understand- cryptocurrency and how it works.pdfRAVI TIKU
 
Cryptocurrency Secrets.pdf
Cryptocurrency Secrets.pdfCryptocurrency Secrets.pdf
Cryptocurrency Secrets.pdfSimoCharif2
 

Similar to Regtech in the era of intermediaries (20)

Cryptocurrency seminar topic presentation using MSWord.
Cryptocurrency seminar topic presentation using MSWord.Cryptocurrency seminar topic presentation using MSWord.
Cryptocurrency seminar topic presentation using MSWord.
 
CRYPTO-CURRENCY By Sahil (G.N.D.U College, Jalandhar)
CRYPTO-CURRENCY By Sahil (G.N.D.U College, Jalandhar)CRYPTO-CURRENCY By Sahil (G.N.D.U College, Jalandhar)
CRYPTO-CURRENCY By Sahil (G.N.D.U College, Jalandhar)
 
CRYPTO-CURRENCY. Ppt by Sahil (G.N.D.U college, Jalandhar)
CRYPTO-CURRENCY. Ppt by Sahil (G.N.D.U college, Jalandhar)CRYPTO-CURRENCY. Ppt by Sahil (G.N.D.U college, Jalandhar)
CRYPTO-CURRENCY. Ppt by Sahil (G.N.D.U college, Jalandhar)
 
Dark Side of Decentralization – What are the Hidden Risks in a Blockchain Rev...
Dark Side of Decentralization – What are the Hidden Risks in a Blockchain Rev...Dark Side of Decentralization – What are the Hidden Risks in a Blockchain Rev...
Dark Side of Decentralization – What are the Hidden Risks in a Blockchain Rev...
 
Crypto currency the bitcoin
Crypto currency the bitcoinCrypto currency the bitcoin
Crypto currency the bitcoin
 
Truth or Dare - Cryptocurrenceis, Realities of ICOs, Risk and Opportunities
Truth or Dare - Cryptocurrenceis, Realities of ICOs, Risk and OpportunitiesTruth or Dare - Cryptocurrenceis, Realities of ICOs, Risk and Opportunities
Truth or Dare - Cryptocurrenceis, Realities of ICOs, Risk and Opportunities
 
Truth or Dare - Cryptocurrenceis, Realities of ICOs, Risk and Opportunities
Truth or Dare - Cryptocurrenceis, Realities of ICOs, Risk and OpportunitiesTruth or Dare - Cryptocurrenceis, Realities of ICOs, Risk and Opportunities
Truth or Dare - Cryptocurrenceis, Realities of ICOs, Risk and Opportunities
 
A Strategist's Guide to Blockchain
A Strategist's Guide to BlockchainA Strategist's Guide to Blockchain
A Strategist's Guide to Blockchain
 
Who Gets to Vote in Crypto?
Who Gets to Vote in Crypto?Who Gets to Vote in Crypto?
Who Gets to Vote in Crypto?
 
Conceptual Issues and Basic Method of BitCoin, Cryptography, Economics & The ...
Conceptual Issues and Basic Method of BitCoin, Cryptography, Economics & The ...Conceptual Issues and Basic Method of BitCoin, Cryptography, Economics & The ...
Conceptual Issues and Basic Method of BitCoin, Cryptography, Economics & The ...
 
Crypto currency
Crypto currencyCrypto currency
Crypto currency
 
The BitcoinHeist: Classifications of Ransomware Crime Families
The BitcoinHeist: Classifications of Ransomware Crime FamiliesThe BitcoinHeist: Classifications of Ransomware Crime Families
The BitcoinHeist: Classifications of Ransomware Crime Families
 
THE BITCOINHEIST: CLASSIFICATIONS OF RANSOMWARE CRIME FAMILIES
THE BITCOINHEIST: CLASSIFICATIONS OF RANSOMWARE CRIME FAMILIESTHE BITCOINHEIST: CLASSIFICATIONS OF RANSOMWARE CRIME FAMILIES
THE BITCOINHEIST: CLASSIFICATIONS OF RANSOMWARE CRIME FAMILIES
 
CS3: Cybersecurity Extortion & Fraud
CS3: Cybersecurity Extortion & FraudCS3: Cybersecurity Extortion & Fraud
CS3: Cybersecurity Extortion & Fraud
 
httpswww.fbi.govnewspressrelpress-releasesfbi-expects-a-ris.docx
httpswww.fbi.govnewspressrelpress-releasesfbi-expects-a-ris.docxhttpswww.fbi.govnewspressrelpress-releasesfbi-expects-a-ris.docx
httpswww.fbi.govnewspressrelpress-releasesfbi-expects-a-ris.docx
 
Paybefore bitcoin hater lover
Paybefore bitcoin hater loverPaybefore bitcoin hater lover
Paybefore bitcoin hater lover
 
BitRush Investor Deck
BitRush Investor DeckBitRush Investor Deck
BitRush Investor Deck
 
IRJET-Concurrency, Security Issues and Upcoming Challenges to Legal Framework...
IRJET-Concurrency, Security Issues and Upcoming Challenges to Legal Framework...IRJET-Concurrency, Security Issues and Upcoming Challenges to Legal Framework...
IRJET-Concurrency, Security Issues and Upcoming Challenges to Legal Framework...
 
“As a layperson -let us understand- cryptocurrency and how it works.pdf
“As a layperson -let us understand- cryptocurrency and how it works.pdf“As a layperson -let us understand- cryptocurrency and how it works.pdf
“As a layperson -let us understand- cryptocurrency and how it works.pdf
 
Cryptocurrency Secrets.pdf
Cryptocurrency Secrets.pdfCryptocurrency Secrets.pdf
Cryptocurrency Secrets.pdf
 

More from Tim Swanson

The Fed and FDIC bailed out “crypto friendly” banks.pptx
The Fed and FDIC bailed out “crypto friendly” banks.pptxThe Fed and FDIC bailed out “crypto friendly” banks.pptx
The Fed and FDIC bailed out “crypto friendly” banks.pptxTim Swanson
 
8 areas for PMF and IMF with blockchains_.pptx
8 areas for PMF and IMF with blockchains_.pptx8 areas for PMF and IMF with blockchains_.pptx
8 areas for PMF and IMF with blockchains_.pptxTim Swanson
 
The Nuances of Tokenization: A brief explanation on attempts from this past d...
The Nuances of Tokenization: A brief explanation on attempts from this past d...The Nuances of Tokenization: A brief explanation on attempts from this past d...
The Nuances of Tokenization: A brief explanation on attempts from this past d...Tim Swanson
 
Collateral-backed stablecoin landscape
Collateral-backed stablecoin landscapeCollateral-backed stablecoin landscape
Collateral-backed stablecoin landscapeTim Swanson
 
DeFi's dependency on the U.S. banking system
DeFi's dependency on the U.S. banking systemDeFi's dependency on the U.S. banking system
DeFi's dependency on the U.S. banking systemTim Swanson
 
Exchange-related chains such as BSC
Exchange-related chains such as BSCExchange-related chains such as BSC
Exchange-related chains such as BSCTim Swanson
 
Color around Dead Token Litigation
Color around Dead Token LitigationColor around Dead Token Litigation
Color around Dead Token LitigationTim Swanson
 
Clouds and Chains
Clouds and ChainsClouds and Chains
Clouds and ChainsTim Swanson
 
Distributed Ledger Technology as Financial Market Infrastructure
Distributed Ledger Technology as Financial Market InfrastructureDistributed Ledger Technology as Financial Market Infrastructure
Distributed Ledger Technology as Financial Market InfrastructureTim Swanson
 
Defining Smart Contracts
Defining Smart ContractsDefining Smart Contracts
Defining Smart ContractsTim Swanson
 
Buckets of Permissioned, Permissionless, and Permissioned Permissionlessness ...
Buckets of Permissioned, Permissionless, and Permissioned Permissionlessness ...Buckets of Permissioned, Permissionless, and Permissioned Permissionlessness ...
Buckets of Permissioned, Permissionless, and Permissioned Permissionlessness ...Tim Swanson
 
Brief overview of cryptoeconomics
Brief overview of cryptoeconomicsBrief overview of cryptoeconomics
Brief overview of cryptoeconomicsTim Swanson
 
The Distributed Ledger Landscape
The Distributed Ledger LandscapeThe Distributed Ledger Landscape
The Distributed Ledger LandscapeTim Swanson
 
The Future of Fintech: Crystal balls and tasseography
The Future of Fintech: Crystal balls and tasseographyThe Future of Fintech: Crystal balls and tasseography
The Future of Fintech: Crystal balls and tasseographyTim Swanson
 
By the numbers: understanding value transfers to and from China
By the numbers: understanding value transfers to and from ChinaBy the numbers: understanding value transfers to and from China
By the numbers: understanding value transfers to and from ChinaTim Swanson
 
Making Lemonade out of Lemons: Squeezing utility from a proof-of-work experiment
Making Lemonade out of Lemons: Squeezing utility from a proof-of-work experimentMaking Lemonade out of Lemons: Squeezing utility from a proof-of-work experiment
Making Lemonade out of Lemons: Squeezing utility from a proof-of-work experimentTim Swanson
 
Moving Beyond BINO Beta
Moving Beyond BINO BetaMoving Beyond BINO Beta
Moving Beyond BINO BetaTim Swanson
 
The Continued Existence of Altcoins, Appcoins and Commodity coins
The Continued Existence of Altcoins, Appcoins and Commodity coinsThe Continued Existence of Altcoins, Appcoins and Commodity coins
The Continued Existence of Altcoins, Appcoins and Commodity coinsTim Swanson
 

More from Tim Swanson (20)

The Fed and FDIC bailed out “crypto friendly” banks.pptx
The Fed and FDIC bailed out “crypto friendly” banks.pptxThe Fed and FDIC bailed out “crypto friendly” banks.pptx
The Fed and FDIC bailed out “crypto friendly” banks.pptx
 
8 areas for PMF and IMF with blockchains_.pptx
8 areas for PMF and IMF with blockchains_.pptx8 areas for PMF and IMF with blockchains_.pptx
8 areas for PMF and IMF with blockchains_.pptx
 
The Nuances of Tokenization: A brief explanation on attempts from this past d...
The Nuances of Tokenization: A brief explanation on attempts from this past d...The Nuances of Tokenization: A brief explanation on attempts from this past d...
The Nuances of Tokenization: A brief explanation on attempts from this past d...
 
Collateral-backed stablecoin landscape
Collateral-backed stablecoin landscapeCollateral-backed stablecoin landscape
Collateral-backed stablecoin landscape
 
DeFi's dependency on the U.S. banking system
DeFi's dependency on the U.S. banking systemDeFi's dependency on the U.S. banking system
DeFi's dependency on the U.S. banking system
 
Exchange-related chains such as BSC
Exchange-related chains such as BSCExchange-related chains such as BSC
Exchange-related chains such as BSC
 
Color around Dead Token Litigation
Color around Dead Token LitigationColor around Dead Token Litigation
Color around Dead Token Litigation
 
Blockchain 2040
Blockchain 2040Blockchain 2040
Blockchain 2040
 
Clouds and Chains
Clouds and ChainsClouds and Chains
Clouds and Chains
 
Distributed Ledger Technology as Financial Market Infrastructure
Distributed Ledger Technology as Financial Market InfrastructureDistributed Ledger Technology as Financial Market Infrastructure
Distributed Ledger Technology as Financial Market Infrastructure
 
Code is not law
Code is not lawCode is not law
Code is not law
 
Defining Smart Contracts
Defining Smart ContractsDefining Smart Contracts
Defining Smart Contracts
 
Buckets of Permissioned, Permissionless, and Permissioned Permissionlessness ...
Buckets of Permissioned, Permissionless, and Permissioned Permissionlessness ...Buckets of Permissioned, Permissionless, and Permissioned Permissionlessness ...
Buckets of Permissioned, Permissionless, and Permissioned Permissionlessness ...
 
Brief overview of cryptoeconomics
Brief overview of cryptoeconomicsBrief overview of cryptoeconomics
Brief overview of cryptoeconomics
 
The Distributed Ledger Landscape
The Distributed Ledger LandscapeThe Distributed Ledger Landscape
The Distributed Ledger Landscape
 
The Future of Fintech: Crystal balls and tasseography
The Future of Fintech: Crystal balls and tasseographyThe Future of Fintech: Crystal balls and tasseography
The Future of Fintech: Crystal balls and tasseography
 
By the numbers: understanding value transfers to and from China
By the numbers: understanding value transfers to and from ChinaBy the numbers: understanding value transfers to and from China
By the numbers: understanding value transfers to and from China
 
Making Lemonade out of Lemons: Squeezing utility from a proof-of-work experiment
Making Lemonade out of Lemons: Squeezing utility from a proof-of-work experimentMaking Lemonade out of Lemons: Squeezing utility from a proof-of-work experiment
Making Lemonade out of Lemons: Squeezing utility from a proof-of-work experiment
 
Moving Beyond BINO Beta
Moving Beyond BINO BetaMoving Beyond BINO Beta
Moving Beyond BINO Beta
 
The Continued Existence of Altcoins, Appcoins and Commodity coins
The Continued Existence of Altcoins, Appcoins and Commodity coinsThe Continued Existence of Altcoins, Appcoins and Commodity coins
The Continued Existence of Altcoins, Appcoins and Commodity coins
 

Recently uploaded

Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 

Recently uploaded (20)

Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 

Regtech in the era of intermediaries

  • 1. Regtech What it is and why it is helpful
  • 2. Disclaimer ● These slides contain names of specific companies. This is for illustrative purposes only and is not intended to be seen as an endorsement. ● The contents herein does not reflect the views or opinions of anyone else but myself. ● I am not a lawyer. 2
  • 3. What, why, and who? 3
  • 4. Common acronyms KYC - Know Your Customer AML - Anti-money Laundering Laws CFT - Countering Financing of Terrorism BSA - Bank Secrecy Act SAR - Suspicious Activity Report PII - Personally Identifiable Information FinCEN - Financial Crimes Enforcement Network 4
  • 5. A (very) brief history of one example Most of the agencies, bureaus, and departments that monitor and enforce these types of laws, do so because of what has happened in the past For instance, following the terrorist attacks on September 11, 2001, a series of laws were enacted including the PATRIOT Act “Title III of the PATRIOT Act amended the BSA to require financial institutions to establish anti-money-laundering programs by establishing internal policies, procedures, and controls, designating compliance officers, providing ongoing employee training, testing their programs through independent audits.” 5
  • 6. What does this have to do with cryptocurrencies? 6
  • 7. Common catch phrases used by promoters “Not your keys, not your coins” “Trusted third parties are security holes” Yet in a given day, the majority of on-chain activity (~80%) is typically movement from one coin intermediary to another 7
  • 8. 8
  • 9. 9
  • 10. Relevant but that’s four years old… … so let’s look at some recent headlines 10
  • 11. 11
  • 12. 12
  • 13. A couple of specific addresses were added due to their role in facilitating the liquidation of bitcoins generated from the SamSam ransomware… … what does that mean for other users in a sanctioned country? 13
  • 14. 14
  • 15. Lightning Torch Ziya Sadr—a UK national from Wales—apparently “evaded” sanctions of Iran by using Lightning... and telling everyone on Twitter. Because we can see the unbroken transactions between Sadr and others, there has been speculation that someone may have violated AML/CTF requirements. That someone could even include infrastructure providers who acted as intermediaries (such as Twitter): - the Torch marketing campaign was conducted off-chain via Twitter which does have a ToS (is also prone to bot-driven manipulation campaigns) 15
  • 16. Bitcoin and all of its clones— in theory— by design have the ability to route around third parties as well, Coinbase even got in trouble for pointing this out in a pitch deck in 2015 16
  • 17. 17
  • 18. 18
  • 19. According to Chainalysis, last year: The U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) issued guidance on cryptocurrencies earlier this year in response to the Petro token. FinCEN issued an advisory on the Iranian regime's illicit activities to exploit the financial system, including the deceptive use of digital currency to bypass sanctions. And in November, OFAC added cryptocurrency addresses linked to individuals to its Specially Designated Nationals (SDN) list for the first time, setting a new precedent requiring cryptocurrency businesses and financial institutions to be prepared to react swiftly to OFAC designations in the future. 19
  • 21. 21
  • 22. Powers traded ~$5 million bitcoin without filing a SAR or obtaining a MSB license 22
  • 23. 23
  • 24. After all these years, why’d LBC make this announcement? Allegedly, walls were closing in them, especially with their role in ransomware liquidation. 24
  • 26. What happened to BTC-e? 26
  • 27. 27
  • 28. Isn’t there adult supervision now? Nope, no widely used SRO (few members in the VCA) SRO: Self-regulating Organization VCA: Virtual Commodity Association 28
  • 29. 29
  • 30. And there is a double-edged sword when an un(der)regulated intermediary collects PII 30
  • 31. 31
  • 32. 32
  • 33. 33
  • 34. Then it turns out the still-living co-founder, Michael Patryn (Omar Dhanani), is an ex-con who got deported from the US for identity theft 34
  • 35. 35
  • 36. How many depositors at Quadriga? 92,000 depositors or 115,000 or 350,000... 36
  • 37. Why do bitcoin holders still deposit their coins with intermediaries even though they know it is a security hazard? 37
  • 38. A user on HitBTC partaking in self-incrimination... 38
  • 39. 39
  • 40. But special interest groups say that hacks are on the decline? Is that true? 40
  • 41. 41
  • 42. Okay, and what about tracing hacks? 42
  • 43. Elementus tracked the CoinBene “hack” Note: CoinBene is alleged to have had ‘fake volume’ prior to large amounts of coins being converted into ETH on Etherdelta 43
  • 44. 44
  • 45. 45
  • 46. Don’t worry, funds are safe… SAFU! 46
  • 47. 47
  • 48. 48
  • 49. Briefly mentioned earlier… … ransomware aka ‘data kidnapping’ 49
  • 50. 50
  • 51. 51
  • 52. According to Coveware The total cost of a ransomware attack can be divided into two main costs: ● First, the recovery cost: ○ These expenses cover forensic reviews and assistance in rebuilding servers and work-stations. If a ransom is paid, then that is also a recovery expense. ● The second, and often more expensive cost of a ransomware attack is the total cost of downtime: ○ Downtime costs are typically 5-10x the actual ransom amount and are measured in lost productivity (slack labor and lost revenue opportunities). 52
  • 53. 53
  • 54. ~98% of these payments were paid in bitcoin Remaining via dash or monero 54
  • 55. What’s a specific example of ransomware? #WannaCry 55
  • 56. 56
  • 57. 57
  • 58. 58
  • 59. 59
  • 60. Are you running infrastructure that is used to process proceeds of illicit activity? 60
  • 61. 61
  • 62. 62
  • 63. Guess which US payment processor allegedly liquidated funds from the GRU? 63
  • 64. 64
  • 65. 65
  • 66. 66
  • 67. 67
  • 69. 69
  • 70. Let’s turn back the clock a few years 70
  • 71. 71
  • 72. Evolution DNM The previous chart visualizes the time period between January 16, 2014 – March 18, 2015. The average number of transactions per day was 1,004 and average bitcoins per day was 562. However, as shown in the chart above it was not until the fall of 2014 that Evolution hit its stride. 72
  • 73. 73
  • 74. Evolution DNM and BitPay Another way of looking at that same trend is the comparison: a log scale measuring the amount of bitcoins that both BitPay (in green) and Evolution (in red) received starting January 16, 2014. The drop off at the end in March 2015 is related to the exit scam that Evolution underwent (and the drop off for BitPay is related to a limitation in WalletExplorer’s data). 74
  • 75. 75
  • 76. According to Soska and Christin 2015 In Figure 5 and the discussion involved, prior to Operation Olympus, six large dark net marketplaces collectively accounted for more than $600,000 in sales per day. It is unclear how much of that activity was expressly illegal, although the paper does attempt to break down the amount of illicit drugs being sold on the same sites. During the same time frame (most of 2014), volume at payment processors such as BitPay and Coinbase were relatively flat with a few outliers during days with speculative and media frenzies as well as ‘Bitcoin Black Friday.’ 76
  • 77. That’s a few years old, what does it look like in April 2019? 77
  • 78. 78
  • 79. What other ways can transfers be visualized? 79
  • 80. 80
  • 81. ‘Backwards looking’ into 2015 According to Chainalysis, by hiding all the intermediate steps we can begin to learn how most of the Bitcoin ecosystem is put together (e.g., can it be split into sub systems?, is there a dark and a lit economy?, and what is bitcoin actually used for?). Legend: ● Blue: virtual currency exchanges ● Red: darknet markets ● Pink: coin mixers ● Green: mining pools ● Yellow: payment processors Altogether there are 14 major exchanges tracked in blue including (in alphabetical order): Bitfinex, Bitreserve (now Uphold), Bitstamp, BitVC (subsidiary of Huobi), BTCC (formerly BTC China), BTC-e, Circle, Coinbase (most), Huobi, itBit, Kraken, LocalBitcoins, OKCoin and Xapo. 81
  • 82. Mt Gox from 2011-2014 (according to WizSec) 82
  • 83. 83
  • 84. 84
  • 85. 85
  • 86. The Craig Wright and David Kleinman estate claims 86
  • 87. According to WizSec: 12hRmmSda9qSSEH656zBaKEbeisH6ZhdTm: ~335,000 BTC (exhibit 10) Claimed to be owned by Wright and supposedly used to lend Kleiman 50,000 BTC as part of a software development licensing and financing agreement. However, this is actually an internal MtGox address, descending directly from Mark Karpelès' famous 424,424.42424242 proof-of-solvency transaction in 2011 87
  • 88. 88
  • 89. WizSec cont’d: 12C9c9VQLMrLi4Ffzq2wDvwrKnUPaAaNFp: 250,000 BTC (exhibit 10) Same as above, claimed to be owned by Wright and supposedly used for a 250,000 BTC loan. However, this address actually belongs to original MtGox founder Jed McCaleb 89
  • 90. 90
  • 92. 92
  • 93. 93
  • 94. Why are (anarchic) cryptocurrencies used? From NY Post: Crypto’s signature qualities appeal to privacy advocates and thieves alike. Theft, said Brian Krebs, owner of the cyber-news site KrebsOnSecurity, is “irreversible.” What you lose, he said, you can’t get back. 94
  • 96. 96
  • 97. 97
  • 98. A (brief) anatomy of a hack The first 10 blocks that included transactions from the August 2016 Bitfinex hack were included in blocks by the following pools (listed chronologically): • BTCC Pool (mined the first block of the hack) • AntPool • ViaBTC • AntPool • BTCC Pool • BW Pool • Bitfury • ViaBTC • F2Pool • F2Pool 98
  • 99. Sometimes service providers are a risk too 99
  • 100. 100
  • 101. 101
  • 102. Jumio cont’d Why is this a big deal? According to one industry source: “These guys are huge, they’re in every crypto exchange. Sounds like a single point of failure. If you outsource your KYC on retail you might be getting dogsh*t. They probably just crawl a couple publicly available databases and perhaps do a query in a paid one like Lexis Nexis and that's it. Who would check anyway? KYC is risk-based so it's not like there's one true way of doing it.” 102
  • 103. Didn’t even touch on: - ICOs / STOs - “stablecoins” that aren’t stable - Gambling / casino games (Satoshi Dice, POWH, FOMO3D) - PTK (ultimate comedy gold) 103
  • 104. But we can turn these lemons into lemonade… … on the horizon is a socially useful invention 104
  • 105. Central bank digital currency (CBDC) Note: there are many different proposals and models 105
  • 106. 106

Editor's Notes

  1. First presented at Boston University on April 23, 2019
  2. Background: https://en.wikipedia.org/wiki/Bank_Secrecy_Act
  3. Source: https://twitter.com/ofnumbers/status/1004394974438252544
  4. Source: https://www.ofnumbers.com/2015/04/22/the-flow-of-funds-on-the-bitcoin-network-in-2015/
  5. Charlie Kelly meme from It’s Always Sunny in Philadelphia
  6. Source: https://home.treasury.gov/news/press-releases/sm556
  7. Source: https://av.sc.com/corp-en/content/docs/Iran-Fincen-advisory.pdf
  8. Source: https://twitter.com/Ziya_Sadr/status/1101948854608515077?s=08
  9. Source: https://freebeacon.com/wp-content/uploads/2015/02/COINBASE-INVESTOR-presentation-2-2.pdf
  10. Source 1: https://freebeacon.com/national-security/bitcoin-exchange-highlights-to-investors-currencys-ability-to-evade-sanctions/ Source 2: https://freebeacon.com/issues/coinbase-exec-resigns-as-company-faces-criticism/
  11. Source: https://blog.chainalysis.com/reports/what-to-expect-in-2019-three-predictions-for-cryptocurrency-compliance
  12. Source: https://www.fincen.gov/news/news-releases/fincen-penalizes-peer-peer-virtual-currency-exchanger-violations-anti-money
  13. Source: https://finance.yahoo.com/news/localbitcoins-announces-supervision-financial-supervisory-172200913.html
  14. Source: https://www.ccn.com/localbitcoins-trader-bitcoin-maven-sentenced-to-prison-for-money-laundering
  15. Source: https://www.fincen.gov/news/news-releases/fincen-fines-btc-e-virtual-currency-exchange-110-million-facilitating-ransomware
  16. Source: https://medium.com/gemini/joining-the-virtual-commodity-association-8bdf3b2f803e
  17. Source: https://www.bloomberg.com/news/articles/2019-02-04/crypto-exchange-founder-dies-leaves-behind-200-million-problem
  18. Source: https://www.bloomberg.com/news/articles/2019-03-01/quadriga-has-6-cold-wallets-but-they-don-t-hold-any-crypto
  19. Source 1: https://www.reddit.com/r/QuadrigaCX/comments/at7xav/where_is_all_my_kyc_data_stored/ Source 2: https://www.reddit.com/r/QuadrigaCX/comments/anu9e1/kyc_identity_theft_issues/
  20. Source: https://www.bloomberg.com/news/articles/2019-03-19/from-fraud-to-fintech-quadriga-co-founder-s-past-crimes-emerge
  21. Source: https://www.theglobeandmail.com/business/article-quadriga-co-founder-served-time-in-us-for-role-in-identity-theft/
  22. Source: https://twitter.com/LukeDashjr/status/1111256396148948992
  23. Source: https://www.theblockcrypto.com/2019/04/01/research-cryptocurrency-exchange-hacks-surpass-1-3-billion-all-time-61-coming-from-2018/
  24. Source: https://elementus.io/blog/coinbene-analysis/
  25. Source: https://elementus.io/blog/coinbene-analysis/
  26. Source: https://elementus.io/blog/coinbene-analysis/
  27. Source: https://blockexplorer.com/news/funds-are-safu-crypto-meme/
  28. Source: https://www.coindesk.com/binance-partners-with-ciphertrace-in-latest-compliance-push
  29. Source: https://cybersecurityventures.com/global-ransomware-damage-costs-predicted-to-exceed-8-billion-in-2018/
  30. Source: https://www.theblockcrypto.com/tiny/ransomware-payments-rise-by-89-per-cent/
  31. Source: https://www.coveware.com/blog/2019/4/15/ransom-amounts-rise-90-in-q1-as-ryuk-ransomware-increases
  32. Source: https://www.coveware.com/blog/2019/4/15/ransom-amounts-rise-90-in-q1-as-ryuk-ransomware-increases
  33. Source: https://twitter.com/ruskin147/status/863044355036246016
  34. Source: https://twitter.com/jeremiahg/status/863104815051792385
  35. Source: https://twitter.com/cnLedger/status/863239556753117184
  36. Source: https://twitter.com/actual_ransom/status/864148421711724544
  37. Source: https://twitter.com/BlockSeer/status/893356092616462336
  38. Source: https://www.wsj.com/articles/how-dirty-money-disappears-into-the-black-hole-of-cryptocurrency-1538149743
  39. Source: https://www.coindesk.com/russian-dnc-hackers-used-cryptocurrency-to-fund-their-operations/
  40. Source: https://blog.cotten.io/russias-bitcoin-hacking-funds-c0a87b33f1e2
  41. Source: https://blog.cotten.io/russias-bitcoin-hacking-funds-c0a87b33f1e2
  42. Source: https://blog.cotten.io/russias-bitcoin-hacking-funds-c0a87b33f1e2
  43. Source: https://motherboard.vice.com/en_us/article/9kx59a/silk-road-2-founder-dread-pirate-roberts-2-caught-jailed-for-5-years
  44. Source: https://www.ofnumbers.com/2015/04/22/the-flow-of-funds-on-the-bitcoin-network-in-2015/
  45. Source: https://www.ofnumbers.com/2015/04/22/the-flow-of-funds-on-the-bitcoin-network-in-2015/
  46. Source: https://www.ofnumbers.com/2015/04/22/the-flow-of-funds-on-the-bitcoin-network-in-2015/
  47. Source: https://www.ofnumbers.com/2015/04/22/the-flow-of-funds-on-the-bitcoin-network-in-2015/
  48. Source: https://www.ofnumbers.com/2015/08/16/cryptocurrency-kysf-know-your-source-of-funds-part-2/
  49. Source: https://www.ofnumbers.com/2015/08/16/cryptocurrency-kysf-know-your-source-of-funds-part-2/
  50. Source: https://twitter.com/nathanielpopper/status/1120727717081522176
  51. Source: https://www.ofnumbers.com/2016/01/10/what-did-bitcoin-movements-look-like-in-2015/
  52. Source: https://www.ofnumbers.com/2016/01/10/what-did-bitcoin-movements-look-like-in-2015/
  53. Source: https://blog.wizsec.jp/2017/07/breaking-open-mtgox-1.html
  54. Source: https://blog.wizsec.jp/2015/04/the-missing-mtgox-bitcoins.html
  55. Source: https://blog.wizsec.jp/2015/04/the-missing-mtgox-bitcoins.html
  56. Source: https://blog.wizsec.jp/2017/07/breaking-open-mtgox-1.html
  57. Source: https://blog.wizsec.jp/2018/02/kleiman-v-craig-wright-bitcoins.html
  58. Source: https://blog.wizsec.jp/2018/02/kleiman-v-craig-wright-bitcoins.html
  59. Source: https://blog.wizsec.jp/2018/02/kleiman-v-craig-wright-bitcoins.html
  60. Source: https://blog.wizsec.jp/2018/02/kleiman-v-craig-wright-bitcoins.html
  61. Source: https://nypost.com/2019/04/13/hackers-are-stealing-millions-in-bitcoin-and-living-like-big-shots/
  62. Source: https://www.reuters.com/article/us-bitfinex-hacked-hongkong-idUSKCN10E0KP
  63. Source: https://twitter.com/BlockSeer/status/761975450587402240
  64. Source of image: http://www.americanbanker.com/news/law-regulation/did-regulatory-meddling-cause-bitfinex-hack-1090569-1.html
  65. Source: http://fortune.com/2019/04/03/jumio-silicon-valley-fraud-sec/
  66. Source: http://fortune.com/2019/04/03/jumio-silicon-valley-fraud-sec/
  67. Source: https://www.bis.org/cpmi/publ/d174.pdf