IDEAS home Printed from https://ideas.repec.org/a/eme/jmlcpp/jmlc-07-2017-0031.html
   My bibliography  Save this article

Illicit Bitcoin transactions: challenges in getting to the who, what, when and where

Author

Listed:
  • Angela S.M. Irwin
  • Adam B. Turner

Abstract

Purpose - The purpose of this paper is to highlight the intelligence and investigatory challenges experienced by law enforcement agencies in discovering the identity of illicit Bitcoin users and the transactions that they perform. This paper proposes solutions to assist law enforcement agencies in piecing together the disparate and complex technical, behavioural and criminological elements that make up cybercriminal offending. Design/methodology/approach - A literature review was conducted to highlight the main law enforcement challenges and discussions and examine current discourse in the areas of anonymity and attribution. The paper also looked at other research and projects that aim to identify illicit transactions involving cryptocurrencies and the darknet. Findings - An optimal solution would be one which has a predictive capability and a machine learning architecture which automatically collects and analyses data from the Bitcoin blockchain and other external data sources and applies search criteria matching, indexing and clustering to identify suspicious behaviours. The implementation of a machine learning architecture would help improve results over time and would be less manpower intensive. Cyber investigators would also receive intelligence in a format and language that they understand and it would allow for intelligence-led and predictive policing rather than reactive policing. The optimal solution would be one which allows for intelligence-led, predictive policing and enables and encourages information sharing between multiple stakeholders from the law enforcement, financial intelligence units, cyber security organisations and fintech industry. This would enable the creation of red flags and behaviour models and the provision of up-to-date intelligence on the threat landscape to form a viable intelligence product for law enforcement agencies so that they can more easily get to the who, what, when and where. Originality/value - The development of a functional software architecture that, in theory, could be used to detected suspicious illicit transactions on the Bitcoin network.

Suggested Citation

  • Angela S.M. Irwin & Adam B. Turner, 2018. "Illicit Bitcoin transactions: challenges in getting to the who, what, when and where," Journal of Money Laundering Control, Emerald Group Publishing Limited, vol. 21(3), pages 297-313, July.
  • Handle: RePEc:eme:jmlcpp:jmlc-07-2017-0031
    DOI: 10.1108/JMLC-07-2017-0031
    as

    Download full text from publisher

    File URL: https://www.emerald.com/insight/content/doi/10.1108/JMLC-07-2017-0031/full/html?utm_source=repec&utm_medium=feed&utm_campaign=repec
    Download Restriction: Access to full text is restricted to subscribers

    File URL: https://www.emerald.com/insight/content/doi/10.1108/JMLC-07-2017-0031/full/pdf?utm_source=repec&utm_medium=feed&utm_campaign=repec
    Download Restriction: Access to full text is restricted to subscribers

    File URL: https://libkey.io/10.1108/JMLC-07-2017-0031?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Yu Song & Bo Chen & Xin-Yi Wang, 2023. "Cryptocurrency technology revolution: are Bitcoin prices and terrorist attacks related?," Financial Innovation, Springer;Southwestern University of Finance and Economics, vol. 9(1), pages 1-20, December.
    2. Satish Kumar & Weng Marc Lim & Uthayasankar Sivarajah & Jaspreet Kaur, 2023. "Artificial Intelligence and Blockchain Integration in Business: Trends from a Bibliometric-Content Analysis," Information Systems Frontiers, Springer, vol. 25(2), pages 871-896, April.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eme:jmlcpp:jmlc-07-2017-0031. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Emerald Support (email available below). General contact details of provider: .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.