Author
Listed:
- Adam Turner
- Angela Samantha Maitland Irwin
Abstract
Purpose - The purpose of this paper is to determine if Bitcoin transactions could be de-anonymised by analysing the Bitcoin blockchain and transactions conducted through the blockchain. In addition, graph analysis and the use of modern social media technology were examined to determine how they may help reveal the identity of Bitcoin users. A review of machine learning techniques and heuristics was carried out to learn how certain behaviours from the Bitcoin network could be augmented with social media technology and other data to identify illicit transactions. Design/methodology/approach - A number of experiments were conducted and time was spend observing the network to ascertain how Bitcoin transactions work, how the Bitcoin protocol operates over the network and what Bitcoin artefacts can be examined from a digital forensics perspective. Packet sniffing software, Wireshark, was used to see whether the identity of a user is revealed when they set up a wallet via an online wallet service. In addition, a block parser was used to analyse the Bitcoin client synchronisation and reveal information on the behaviour of a Bitcoin node when it joins the network and synchronises to the latest blockchain. The final experiment involved setting up and witnessing a transaction using the Bitcoin Client API. These experiments and observations were then used to design a proof of concept and functional software architecture for searching, indexing and analyzing publicly available data flowing from the blockchain and other big data sources. Findings - Using heuristics and graph analysis techniques show us that it is possible to build up a picture of behaviour of Bitcoin addresses and transactions, then utilise existing typologies of illicit behaviour to collect, process and exploit potential red flag indicators. Augmenting Bitcoin data, big data and social media may be used to reveal potentially illicit financial transaction going through the Bitcoin blockchain and machine learning applied to the data sets to rank and cluster suspicious transactions. Originality/value - The development of a functional software architecture that, in theory, could be used to detect suspicious illicit transactions on the Bitcoin network.
Suggested Citation
Adam Turner & Angela Samantha Maitland Irwin, 2018.
"Bitcoin transactions: a digital discovery of illicit activity on the blockchain,"
Journal of Financial Crime, Emerald Group Publishing Limited, vol. 25(1), pages 109-130, January.
Handle:
RePEc:eme:jfcpps:jfc-12-2016-0078
DOI: 10.1108/JFC-12-2016-0078
Download full text from publisher
As the access to this document is restricted, you may want to
for a different version of it.
Citations
Citations are extracted by the
CitEc Project, subscribe to its
RSS feed for this item.
Cited by:
- Marcus Smith & Milind Tiwari, 2023.
"The implications of national blockchain infrastructure for financial crime,"
Journal of Financial Crime, Emerald Group Publishing Limited, vol. 31(2), pages 236-248, June.
- Chunling Li & Nosherwan Khaliq & Leslie Chinove & Usama Khaliq & József Popp & Judit Oláh, 2023.
"Cryptocurrency Acceptance Model to Analyze Consumers’ Usage Intention: Evidence From Pakistan,"
SAGE Open, , vol. 13(1), pages 21582440231, March.
- Rico-Peña, Juan Jesús & Arguedas-Sanz, Raquel & López-Martin, Carmen, 2023.
"Models used to characterise blockchain features. A systematic literature review and bibliometric analysis,"
Technovation, Elsevier, vol. 123(C).
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eme:jfcpps:jfc-12-2016-0078. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
We have no bibliographic references for this item. You can help adding them by using this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Emerald Support (email available below). General contact details of provider: .
Please note that corrections may take a couple of weeks to filter through
the various RePEc services.