how to combat the illegal use of cryptocurrency - … · the dark web used for buying and selling...

11
1 White Paper HOW TO COMBAT THE ILLEGAL USE OF CRYPTOCURRENCY

Upload: others

Post on 02-Aug-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: HOW TO COMBAT THE ILLEGAL USE OF CRYPTOCURRENCY - … · the dark web used for buying and selling weapons, drugs, hacker toolkits, for ransom payments, to name just a few. ... Collect

1

White Paper

HOW TO COMBAT THE ILLEGAL USE OF CRYPTOCURRENCY

Page 2: HOW TO COMBAT THE ILLEGAL USE OF CRYPTOCURRENCY - … · the dark web used for buying and selling weapons, drugs, hacker toolkits, for ransom payments, to name just a few. ... Collect

Cryptocurrency has many legitimate uses, but it is also

used in illegal transactions. It is the favorite currency on

the dark web used for buying and selling weapons, drugs,

hacker toolkits, for ransom payments, to name just a few.

It is also used for financing terror, human trafficking and

criminal operations. Due to its blockchain technology,

cryptocurrency transactions are hard to trace by law

enforcement agencies.

However, these transactions do leave digital footprints

behind that can be traced. This entails that law

enforcement agencies need tools that can do much more

than analyzing internal data such as criminal records and

prior cases. They need a solution that can analyze the

technical details of electronic activities, online behavior,

and other cyber information online, especially on the

deep web and dark web.

Only an AI powered WEBINT solution will be able to assist

by extracting comprehensive intelligent insights. That is

why Cobwebs Technologies has developed its powerful

WEBINT solution utilizing its proprietary technology and

the latest machine learning algorithms to extract targeted

intelligence from collected big data. This allows law

enforcement agencies to get generated critical insights

automatically for taking immediate action such as

sending out terror alerts or making arrests.

WEBINT IS THE PROCESS OF COLLECTING AND ANALYZING WEB DATA TO GAIN VALUABLE INSIGHTS

2

GLOSSARY

INTRODUCTION

AI Artificial IntelligenceICO Initial Coin OfferingOSINT Open Source Intelligence ToolsOTC Over The CounterWEBINT Web Intelligence Solution

Page 3: HOW TO COMBAT THE ILLEGAL USE OF CRYPTOCURRENCY - … · the dark web used for buying and selling weapons, drugs, hacker toolkits, for ransom payments, to name just a few. ... Collect

Russian dark web marketplace Hydra (known for buying and selling illegal goods and services) has filed an investment document at CoinDesk for an ICO in which it is seeking to raise $146 million by selling tokens for Bitcoin. According to the document, Hydra will issue 1,470,000 tokens sold for $100 worth of Bitcoin each (720,300 tokens can be bought by the general public). Hydra plans to launch a new worldwide anonymous service called Eternos that would include a cryptocurrency exchange, Tor-like browser,

encrypted messenger, and an OTC marketplace.

3

Since its inception in 2009, cryptocurrency (defined as any kind of peer-to-peer

digital money powered by the blockchain technology) is recognized and used as

a legitimate alternative for legal tenders that are controlled by central banks. The

most popular cryptocurrencies include Bitcoin (BTC), Litecoin (LTC), Ethereum

(ETH), and Ripple (XRP). They are popular with legitimate users since the secure

transactions bypass traditional financial institutions thus avoiding bank costs and

exchange rate losses.

From the beginning, criminal elements have recognized the use of cryptocurrency

for their transactions, making the “follow the money” strategy of law enforcement

problematic. Cryptocurrency is used on the dark web to buy and sell illegal

merchandise, stolen data, hacker software, drugs, and weapons to just name a few.

CRYPTOCURRENCY AND CYBERCRIME

Page 4: HOW TO COMBAT THE ILLEGAL USE OF CRYPTOCURRENCY - … · the dark web used for buying and selling weapons, drugs, hacker toolkits, for ransom payments, to name just a few. ... Collect

Figure 1- The number of legal vs illegal bitcoin users 2009-2017

Cryptocurrency is also used for ransom demands as part of ransomware

attacks and for sponsoring terrorist activities. Dark web transactions are often

opened and closed with cryptocurrencies leaving hardly any trace. Intelligence

agencies and their analysts are left with only a few scraps of evidence to piece

together who financed what for which purpose.

4

Figure 1 shows legal bitcoin users (the dashed line) and illegal bitcoin

users (the solid line). The numbers are based on two empirical models.

(Source: Sex, drugs, and bitcoin: How much illegal activity is financed

through cryptocurrencies? by the University of Sydney.

The researchers concluded that approximately one-quarter of bitcoin

users are involved in illegal activity, and that around $76 billion of illegal

activity per year involves bitcoin (46% of bitcoin transactions). Their

findings suggest that cryptocurrencies are transforming the black markets

by enabling “black e-commerce”.

Page 5: HOW TO COMBAT THE ILLEGAL USE OF CRYPTOCURRENCY - … · the dark web used for buying and selling weapons, drugs, hacker toolkits, for ransom payments, to name just a few. ... Collect

Figure 2 below is a schematic representation of a criminal cash flow using

bitcoins. (Source: Money Laundering and Terrorist Financing Awareness

Handbook for Tax Examiners and Tax Auditors published by the OECD.)

Figure 2- Criminal Cash Flow Using Bitcoins

5

As mentioned before, cryptocurrency is used by terrorist organizations

and their affiliates to finance activities and weapons, and to get paid. Since

these transactions are executed with encrypted digital coins and smart

contracts, the identity of the parties is obfuscated and almost untraceable.

The agility of cryptocurrency enables terror to be easily financed,

especially since extremist groups and terrorist organizations like to

recruit tech-savvy lone wolves to do their bidding, such as conducting

cyberattacks and data breaches, and enabling encrypted communication

to designated locations to inform conspirators of the time and place of the

attack or to send instructions.

Page 6: HOW TO COMBAT THE ILLEGAL USE OF CRYPTOCURRENCY - … · the dark web used for buying and selling weapons, drugs, hacker toolkits, for ransom payments, to name just a few. ... Collect

Figure 3- Assessment of Terrorist Activities Regarding Cryptocurrencies

6

In its research report “Terrorist Use of Cryptocurrencies, Technical and

Organizational Barriers and Future Threats”, the RAND Corporation identified the

usefulness of cybercurrency for financing terrorism (See Figure 3).

TRACING CRYPTOCURRENCY BY LAW ENFORCEMENT

With the growing popularity of cryptocurrency, its use by threat actors, criminal

elements and terrorists is expanding exponentially. This, combined with data

volumes reaching record heights, law enforcement agencies all over the world

are looking for tools to analyze the many layers of the dark web and related

digital platforms to battle crime and terrorism.

Page 7: HOW TO COMBAT THE ILLEGAL USE OF CRYPTOCURRENCY - … · the dark web used for buying and selling weapons, drugs, hacker toolkits, for ransom payments, to name just a few. ... Collect

7

Tracing cryptocurrency is already a “significant” issue and becoming a bigger one for the FBI. “We are looking at it from an investigative perspective, including tools that we have to follow the money even in this new world that we’re living in. Christopher Wray, Director of the FBI

Threat actors as well as criminal elements and organizations leave a digital

footprint during their wheelings and dealings that are normally detected by

solutions that analyze the technical details of electronic activity, online behavior,

and cyber information such as IP addresses, timestamps, device indicators, etc.

Although such solutions are useful, they are unable to give the full picture.

Complex financial networks can be hard to detect due to various masking methods

used to remain obfuscated. Law enforcement agencies are often relying on internal

data such as transactions, criminal records and prior cases which only provides

limited information. With only 5% of information publicly available on the open web

and 95% present in the deep web and dark web, an AI powered WEBINT solution is

needed to extract comprehensive intelligent insights.

THE NEED FOR AI WEBINT SOLUTIONS

Page 8: HOW TO COMBAT THE ILLEGAL USE OF CRYPTOCURRENCY - … · the dark web used for buying and selling weapons, drugs, hacker toolkits, for ransom payments, to name just a few. ... Collect

8

Threat actors as well as criminal elements and organizations leave a

digital footprint during their wheelings and dealings that are normally

detected by solutions that analyze the technical details of electronic

activity, online behavior, and cyber information such as IP addresses,

timestamps, device indicators, etc. Although such solutions are useful,

they are unable to give the full picture.

Complex financial networks can be hard to detect due to various masking

methods used to remain obfuscated. Law enforcement agencies are

often relying on internal data such as transactions, criminal records and

prior cases which only provides limited information. With only 5% of

information publicly available on the open web and 95% present in the

deep web and dark web, an AI powered WEBINT solution is needed to

extract comprehensive intelligent insights.

“Online illegal money transfers are often the basis of criminal and terrorist activities. Since these money transfers take place on the dark web, social networks, databases, forums and blogs, only an AI WEBINT solution can comb through all these masses of data, and trace back to the right profile” Udi Levy, Co-founder and CEO of Cobwebs Technologies

THE IMPORTANCE OF AN AI WEBINT SOLUTION

Page 9: HOW TO COMBAT THE ILLEGAL USE OF CRYPTOCURRENCY - … · the dark web used for buying and selling weapons, drugs, hacker toolkits, for ransom payments, to name just a few. ... Collect

Search AnalyzeCollect game-changing data from the world’s vast digital channels in real-time

Analyze and connect the dots to discover hidden leads & extract intelligent insights

Build suspect profiles, reconstruct social circles, identify various threats and generate evidence.

Engage

The Cobwebs Technologies Process

9

Only such a solution can detect criminal activities even when those are deeply

rooted in encrypted domains such as the dark web and mobile apps in order to

locate and prevent the financing of terror with cryptocurrencies through various

platforms and mobile apps. Such a solution must integrate leading forms of AI to

pinpoint initiators of terrorist communication as well as the detection of individuals

who support, assist or fund terror. In short, such a solution should enable law

enforcement agencies to transform collected data into measurable clues.

To assist law enforcement agencies, Cobwebs Technologies has developed its

state-of-the-art web intelligence platform that extracts targeted critical insights

automatically from big data utilizing advanced and powerful AI machine learning

algorithms. It allows law enforcement to untangle terror financing networks,

analyze terrorist financing web posts, decompose the various elements used (e.g.,

bitcoin payments, messages, emails, etc.), and trace bitcoin transaction from the

source via the transactions network to the destination. Law enforcement agencies

will get insight into all the financial interactions between tagged wallets, local and

foreign exchanges, dark web marketplaces, donors, and the tagged terror.

The powerful web intelligence solution monitors online activity, collecting and

analyzing data of endless digital channels – from open, deep and dark web, to

mobile and social. To illustrate, the utilized streamlined AI enables detection

of physical objects (e.g., weapons), identification of landmarks (e.g., Palace of

Westminster), OCR in text messages, and facial recognition. Webpage topics are

analyzed for tracking digital fingerprints, reconstruction profiles, and correlating

date to rebuild real-world data.

Page 10: HOW TO COMBAT THE ILLEGAL USE OF CRYPTOCURRENCY - … · the dark web used for buying and selling weapons, drugs, hacker toolkits, for ransom payments, to name just a few. ... Collect

Figure 5 - Dark web Profiles Connections Analysis

10

The powerful WEBINT solution utilizes proprietary technology to

extract targeted intelligence from the collected big data, using the

latest machine learning algorithms, for generating critical insights

automatically.

With Cobwebs Technologies, law enforcement and governmental

organizations will be able to monitor social media and the open, deep

and dark web, process vast amounts of public data to detect threats,

analyze the results automatically, and use the streamlined automated

insights for immediate action such as sending out alerts in real-time.

Page 11: HOW TO COMBAT THE ILLEGAL USE OF CRYPTOCURRENCY - … · the dark web used for buying and selling weapons, drugs, hacker toolkits, for ransom payments, to name just a few. ... Collect

www.cobwebs.com

Cobwebs Technologies is a global leader in Web Intelligence, providing innovative

solutions tailored to the operational needs of the public and private sectors by

identifying threats and generating insights in real-time.

The Company’s advanced artificial intelligence and machine learning algorithms,

deliver powerful threat intelligence by deciphering the intricacies of web layers and

analyzing the complex details of structured and unstructured data.

Its web intelligence platform monitors these vast sources of data for revealing

hidden clues and generating insights for intelligence-enhanced security to keep the

world safer.

ABOUT COBWEBS TECHNOLOGIES