Access the full text.
Sign up today, get DeepDyve free for 14 days.
Paul Hunton (2010)
Cyber Crime and Security: A New Model of Law Enforcement InvestigationPolicing-an International Journal of Police Strategies & Management, 4
Brian Carrier, E. Spafford (2006)
Categories of digital investigation analysis techniques based on the computer history modelDigit. Investig., 3
James Martin (2014)
Lost on the Silk Road: Online drug distribution and the ‘cryptomarket’Criminology & Criminal Justice, 14
Angela Irwin, G. Milad (2016)
The use of crypto-currencies in funding violent jihadJournal of Money Laundering Control, 19
S. Selamat, R. Yusof, S. Sahib (2008)
Mapping Process of Digital Forensic Investigation Framework
D. Weisburd, J. Eck (2004)
What Can Police Do to Reduce Crime, Disorder, and Fear?The ANNALS of the American Academy of Political and Social Science, 593
(2006)
Intelligence-Led policing: the AFP approach
Adriana Seagle (2015)
Intelligence Sharing Practices Within NATO: An English School PerspectiveInternational Journal of Intelligence and CounterIntelligence, 28
Jonathan Lim (2015)
A Facilitative Model for Cryptocurrency Regulation in Singapore
Ruibin Gong, Tony Chan, Mathias Gaertner (2005)
Case-Relevance Information Investigation: Binding Computer Intelligence to the Current Computer Forensic FrameworkInt. J. Digit. EVid., 4
Sundresan Perumal (2009)
Digital Forensic Model Based On Malaysian Investigation Process
S. Meiklejohn, Marjori Pomarole, Grant Jordan, Kirill Levchenko, Damon McCoy, G. Voelker, S. Savage (2013)
A fistful of bitcoins: characterizing payments among men with no namesProceedings of the 2013 conference on Internet measurement conference
R. Gross, A. Acquisti (2005)
Information revelation and privacy in online social networks
S. Ciardhuáin (2004)
An Extended Model of Cybercrime InvestigationsInt. J. Digit. EVid., 3
Joseph Bonneau, Andrew Miller, Jeremy Clark, Arvind Narayanan, Joshua Kroll, E. Felten (2015)
SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies2015 IEEE Symposium on Security and Privacy
Md Karim, A. Syeda (2018)
The Influencing Factors Associated with Ketosis-Prone Type 2 Diabetes Mellitus: A Syndrome of Diabetes MellitusInternational Journal of Digital Evidence, 3
Mark Pollitt (2007)
An Ad Hoc Review of Digital Forensic ModelsSecond International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE'07)
J. Colly, Adam, Barristers-at-Law (1907)
Criminal InvestigationThe Indian Medical Gazette, 42
R. Ieong (2006)
FORZA - Digital forensics investigation framework that incorporate legal issuesDigit. Investig., 3
N. Beebe, J. Clark (2005)
A hierarchical, objectives-based framework for the digital investigations processDigit. Investig., 2
D. Chaum (1982)
Blind Signatures for Untraceable Payments
Vasilios Katos, P. Bednar (2008)
A cyber-crime investigation frameworkComput. Stand. Interfaces, 30
International Journal of Digital Evidence, 3
F. Reid, Martin Harrigan (2011)
An Analysis of Anonymity in the Bitcoin System2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing
Shayan Eskandari, Jeremy Clark, David Barrera, E. Stobert (2018)
A first look at the usability of bitcoin key managementArXiv, abs/1802.04351
Daniela Sonderegger (2015)
A Regulatory and Economic Perplexity: Bitcoin Needs Just a Bit of RegulationWashington University Journal of Law and Policy, 47
J. Camenisch, S. Hohenberger, Anna Lysyanskaya (2005)
Compact E-CashIACR Cryptol. ePrint Arch., 2005
Isaac Pflaum, Emmeline Hateley (2014)
A Bit of a Problem: National and Extraterritorial Regulation of Virtual Currency in the Age of Financial DisintermediationGeorgetown Journal of International Law, 45
Elli Androulaki, Ghassan Karame, Marc Roeschlin, T. Scherer, Srdjan Capkun (2013)
Evaluating User Privacy in Bitcoin
PurposeThe purpose of this paper is to highlight the intelligence and investigatory challenges experienced by law enforcement agencies in discovering the identity of illicit Bitcoin users and the transactions that they perform. This paper proposes solutions to assist law enforcement agencies in piecing together the disparate and complex technical, behavioural and criminological elements that make up cybercriminal offending.Design/methodology/approachA literature review was conducted to highlight the main law enforcement challenges and discussions and examine current discourse in the areas of anonymity and attribution. The paper also looked at other research and projects that aim to identify illicit transactions involving cryptocurrencies and the darknet.FindingsAn optimal solution would be one which has a predictive capability and a machine learning architecture which automatically collects and analyses data from the Bitcoin blockchain and other external data sources and applies search criteria matching, indexing and clustering to identify suspicious behaviours. The implementation of a machine learning architecture would help improve results over time and would be less manpower intensive. Cyber investigators would also receive intelligence in a format and language that they understand and it would allow for intelligence-led and predictive policing rather than reactive policing. The optimal solution would be one which allows for intelligence-led, predictive policing and enables and encourages information sharing between multiple stakeholders from the law enforcement, financial intelligence units, cyber security organisations and fintech industry. This would enable the creation of red flags and behaviour models and the provision of up-to-date intelligence on the threat landscape to form a viable intelligence product for law enforcement agencies so that they can more easily get to the who, what, when and where.Originality/valueThe development of a functional software architecture that, in theory, could be used to detected suspicious illicit transactions on the Bitcoin network.
Journal of Money Laundering Control – Emerald Publishing
Published: Jul 2, 2018
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.